This post was authored by Leendert vanDoorn

 

AMD’s hardware and software collaboration with technology partners enables a host of security features that can help users protect confidential information in an era when there are more challenges than ever before.

 

Security is rarely far from the headlines, and now more than ever before, users and organizations have to protect more and more of their data thanks to the proliferation of mobile devices, cloud services and the ability for employees to bring their own devices to work or “BYOD”. AMD’s innovative processors work in-concert with products from a broad, established ecosystem helps consumers and businesses to effectively address security concerns.

The broad use of mobile devices represents a considerable threat to security not only due to their physical portability, but also because of the challenges involved. These challenges include applying appropriate access controls or authentication protocols, maintaining the device’s software and securing data locally as well as in the cloud, all in an effort to mitigate vulnerabilities while simultaneously enabling ease of access. With data now becoming fully mobile, residing both on the device itself and in the cloud, not only does the mobile device provide a direct source for sensitive data, it is an access point to the wealth of data stored in the cloud, thus increasing its value to potential attackers.

AMD’s open ecosystem approach to security enables users to be secure, while benefiting from ongoing innovation in the security community. This “customer first” policy is key to providing users with the ability to embrace security features without minimal cost and the fear of vendor lock-in.

In 2012 AMD announced it would incorporate ARM TrustZone® technology into future products Accelerated Processing Units (APUs). More recently, AMD announced that it will license a Trusted Execution Environment, also known as a security kernel, from Trustonic™ and collaborate on incorporating this key ecosystem enabling technology into AMD products. By licensing the Trustonic™-based product, select AMD products will gain access to a broad community of trusted application developers who are ready to deploy security services and applications.

AMD's open, collaborative approach to creating a security ecosystem was evident at this year's AMD Developer Summit, APU13, where major players in the security industry delivered presentations on what can be done when leveraging technologies found in AMD processors and incorporating open standards. Companies including Adobe, ARM, Authernative, BIO-Key, Elliptic Technologies, ExactTrak, Fingerprint Cards AB, Trustonic and VASCO talked about innovative applications, authentication and ease of access technologies through which data, identity and content can be secured across a multitude of devices and services, including the “Internet of Things”.

AMD’s collaborative approach with a variety of vendors and technology partners to establish and expand an open ecosystem results in consumers and businesses having access to best of breed security solutions that are helping to tackle our industry’s biggest challenges and threats.


Leendert vanDoorn is a corporate fellow at AMD. His postings are his own opinions and may not represent AMD’s positions, strategies, or opinions. Links to third-party sites and references to third-party trademarks are provided for convenience and illustrative purposes only. Unless explicitly stated, AMD is not responsible for the contents of such links, and no third-party endorsement of AMD or any of its products is implied.