Cog Systems’ Secure Virtualization Available in Qualcomm Snapdragon Platforms | IoT For All

Cog Systems’ Secure Virtualization Available in Qualcomm Snapdragon Platforms

-

Cybersecurity software provider Cog Systems, leaders in securing IoT, has been chosen by Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, to provide virtualization-based security for its Qualcomm® Snapdragon™ platforms, in a collaboration agreement announced by the company today.

Cog’s security and virtualization APIs will be available in select Snapdragon mobile platforms, including the recently launched Snapdragon 855. This will enable connected devices, such as Android phones and IoT devices, to access Cog’s virtualized modular security technology, known as D4 Secure.

D4 Secure is a security and virtualization platform for connected devices that offers uncompromised performance and flexibility. Cog’s virtualization enables end-point innovation through modularity and provides a platform for myriad use cases like advanced biometrics, AI and machine learning algorithms, simultaneous dual OS, and others without compromising security or performance.

Cog’s products are used by more than 30 organizations globally, including General Dynamics and Northrop Grumman, as well as U.S. and international government and defense agencies. This collaboration with Qualcomm Technologies is expected to put Cog’s security into the toolkit of OEMs, and devices worldwide.

“Adding Cog’s virtualization technology to our chipset platforms enhances our already robust security and brings significant flexibility for our customers,” said Jesse Seed, Director of Product Management, Qualcomm Technologies, Inc. “Simplifying and securing the connected device ecosystem is critical and a key goal for both companies.”

“Qualcomm Technologies’ global reach will enable us to deliver secure-by-design as a global phenomenon rather than best practice,” Dr. Daniel Potts, CEO of Cog Systems says.

Snapdragon 855, combined with the Snapdragon X50 modem, has been heralded as a breakthrough for 5G networks, leading AI processing, and blazing fast performance. Cog’s ‘secure by design’ approach will further enable new use cases that can be enabled as the OEMs embrace virtualization, while ensuring security as a core component of every new design.

Virtualization is rapidly becoming recognized as a crucial security approach around the world. Research from 2018 by the University of New South Wales under the leadership of Dr. Gernot Heiser proved the long-held assumption that type 1 virtualization was the most secure approach by testing the impact the size of a device’s trusted computing base has on minimizing critical threats. They developed a modular system built on sel4 and were able to completely eliminate 40% of the critical threats from the Common Vulnerability Assessments (CVE) database, while mitigating a further 59% to one degree or another.

IoT For All
IoT For All
IoT For All is an initiative to build a valuable resource for all stakeholders in the IoT industry. Our goal is to bring together the smartest minds in IoT to share knowledge through various forms of content, all aimed at educating the people who are implementing and enabling IoT.

Trending

Five Problems That Can Sink an IoT Certification Project

In this article, Phil Beecher, president and CEO of the Wi-SUN Alliance, addresses the top five stumbling blocks that organizations must overcome to achieve IoT interoperability and enable IoT certification success.
Image of people talking with the words "WORK HARDER" behind them - "Harder" is crossed out and "SMARTER" is written next to it

How to Plan Your IIoT Solution for Long-Term Scalability

Adopting IIoT products is essential to maintaining a competitive edge in today’s digital landscape; however, failing to plan for long-term scalability can create obstacles on the pathway to success. This post explores how companies can implement IIoT solutions to achieve long-term success.
Towards-a-New-Model-of-Data-Ownership

Toward a New Model of Data Ownership

Data is today’s most used currency. The business model developed by big tech firms over the past decade, by which consumers pay for services with their personal data instead of money, is being undermined by long-term social trends toward greater care for privacy. Do you own your personal data? Could you sell it instead of giving it away? How can trust be built in that type of transaction?
How to Effectively Handle Digital Transformation

Podcast E031 | How to Effectively Handle the Digital Transformation Journey | Sean Parham,...

On this IoT For All podcast episode, Sean Parham, Corporate VP of Product Management at ABB Ability explains the short term changes companies are making to handle their digital transformation journies effectively. Sean also discusses how the biggest changes throughout that transformation aren't found in the technology but enabled by it.
A person holding digital tablets with the text "Digital Identity" in the background

Smart City Data: Digital Identity Meets Critical Infrastructure

Tying our (digital) identities to IoT devices creates a critical smart city infrastructure complicates privacy and security.