Cog Systems’ Secure Virtualization Available in Qualcomm Snapdragon Platforms

-

Cybersecurity software provider Cog Systems, leaders in securing IoT, has been chosen by Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, to provide virtualization-based security for its Qualcomm® Snapdragon™ platforms, in a collaboration agreement announced by the company today.

Cog’s security and virtualization APIs will be available in select Snapdragon mobile platforms, including the recently launched Snapdragon 855. This will enable connected devices, such as Android phones and IoT devices, to access Cog’s virtualized modular security technology, known as D4 Secure.

D4 Secure is a security and virtualization platform for connected devices that offers uncompromised performance and flexibility. Cog’s virtualization enables end-point innovation through modularity and provides a platform for myriad use cases like advanced biometrics, AI and machine learning algorithms, simultaneous dual OS, and others without compromising security or performance.

Cog’s products are used by more than 30 organizations globally, including General Dynamics and Northrop Grumman, as well as U.S. and international government and defense agencies. This collaboration with Qualcomm Technologies is expected to put Cog’s security into the toolkit of OEMs, and devices worldwide.

“Adding Cog’s virtualization technology to our chipset platforms enhances our already robust security and brings significant flexibility for our customers,” said Jesse Seed, Director of Product Management, Qualcomm Technologies, Inc. “Simplifying and securing the connected device ecosystem is critical and a key goal for both companies.”

“Qualcomm Technologies’ global reach will enable us to deliver secure-by-design as a global phenomenon rather than best practice,” Dr. Daniel Potts, CEO of Cog Systems says.

Snapdragon 855, combined with the Snapdragon X50 modem, has been heralded as a breakthrough for 5G networks, leading AI processing, and blazing fast performance. Cog’s ‘secure by design’ approach will further enable new use cases that can be enabled as the OEMs embrace virtualization, while ensuring security as a core component of every new design.

Virtualization is rapidly becoming recognized as a crucial security approach around the world. Research from 2018 by the University of New South Wales under the leadership of Dr. Gernot Heiser proved the long-held assumption that type 1 virtualization was the most secure approach by testing the impact the size of a device’s trusted computing base has on minimizing critical threats. They developed a modular system built on sel4 and were able to completely eliminate 40% of the critical threats from the Common Vulnerability Assessments (CVE) database, while mitigating a further 59% to one degree or another.

IoT For All
IoT For All
IoT For All is an initiative to build a valuable resource for all stakeholders in the IoT industry. Our goal is to bring together the smartest minds in IoT to share knowledge through various forms of content, all aimed at educating the people who are implementing and enabling IoT.

Trending

Image of a data center with a comic book sound effect bubble that says "Reliability"

Improving Data Center Reliability With IoT

Reliability and availability are essential to data centers. IoT can enable better issue tracking and data collection, leading to greater stability.
5-CES-Inspired-IoT-Trends-to-Dominate-in-2019

5 CES-Inspired IoT Trends to Dominate in 2019

CES 2019 showed us a glimpse into the future of IoT and what it will bring in the coming years. From edge computing to smart home systems to legal problems surround IoT data, let's dive in.
Someone taking a picture of architecture

3 Ways AI Has Gone Mainstream Without Anyone Noticing

Here are some examples of how mainstream AI is changing the world around us, in ways that most people probably haven't noticed.
Lisa Uhrmacher

Breaking Down Barriers as a Woman in IoT

An interview with VP of IoT Sales at Vodafone, Lisa Uhrmacher, encouraging women to never underestimate the attributes and perspective they bring to the technology industry.
Wai Loong Lim

Podcast E023 | How to Design and Build Connected Devices | Wai Loong-Lim, Founder...

On this #AskIoT episode, we discuss the design challenges associated with building connected devices, how to bring a product to life and the emerging technologies influencing the product design process.