Cog Systems’ Secure Virtualization Available in Qualcomm Snapdragon Platforms | IoT For All

Cog Systems’ Secure Virtualization Available in Qualcomm Snapdragon Platforms

-

Cybersecurity software provider Cog Systems, leaders in securing IoT, has been chosen by Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, to provide virtualization-based security for its Qualcomm® Snapdragon™ platforms, in a collaboration agreement announced by the company today.

Cog’s security and virtualization APIs will be available in select Snapdragon mobile platforms, including the recently launched Snapdragon 855. This will enable connected devices, such as Android phones and IoT devices, to access Cog’s virtualized modular security technology, known as D4 Secure.

D4 Secure is a security and virtualization platform for connected devices that offers uncompromised performance and flexibility. Cog’s virtualization enables end-point innovation through modularity and provides a platform for myriad use cases like advanced biometrics, AI and machine learning algorithms, simultaneous dual OS, and others without compromising security or performance.

Cog’s products are used by more than 30 organizations globally, including General Dynamics and Northrop Grumman, as well as U.S. and international government and defense agencies. This collaboration with Qualcomm Technologies is expected to put Cog’s security into the toolkit of OEMs, and devices worldwide.

“Adding Cog’s virtualization technology to our chipset platforms enhances our already robust security and brings significant flexibility for our customers,” said Jesse Seed, Director of Product Management, Qualcomm Technologies, Inc. “Simplifying and securing the connected device ecosystem is critical and a key goal for both companies.”

“Qualcomm Technologies’ global reach will enable us to deliver secure-by-design as a global phenomenon rather than best practice,” Dr. Daniel Potts, CEO of Cog Systems says.

Snapdragon 855, combined with the Snapdragon X50 modem, has been heralded as a breakthrough for 5G networks, leading AI processing, and blazing fast performance. Cog’s ‘secure by design’ approach will further enable new use cases that can be enabled as the OEMs embrace virtualization, while ensuring security as a core component of every new design.

Virtualization is rapidly becoming recognized as a crucial security approach around the world. Research from 2018 by the University of New South Wales under the leadership of Dr. Gernot Heiser proved the long-held assumption that type 1 virtualization was the most secure approach by testing the impact the size of a device’s trusted computing base has on minimizing critical threats. They developed a modular system built on sel4 and were able to completely eliminate 40% of the critical threats from the Common Vulnerability Assessments (CVE) database, while mitigating a further 59% to one degree or another.

IoT For All
IoT For All
IoT For All is an initiative to build a valuable resource for all stakeholders in the IoT industry. Our goal is to bring together the smartest minds in IoT to share knowledge through various forms of content, all aimed at educating the people who are implementing and enabling IoT.

Trending

Two construction workers

Implications of IoT Security in Construction Use Cases

Security is one of the most important areas in IoT. It is a major topic for discussion within organizations in the construction industry.

Is 5G Ready for IoT?

5G is finally here. This year, we’ve seen the first 5G networks going live for consumers in the US, UK and South Korea. It’s the first generation of cellular...
The text MQTT on an abstract background

Using an MQTT Broker? Here’s Why You Need to Think About Scalability

Simply having 10 connected devices could mean that your MQTT broker should be capable of handling scaling to 100 simultaneous messages.
Cartoon of a brain and a city in the background

Artificial Intelligence and Machine Learning: The Brain of a Smart City

AI and ML can improve decision making, personalize experiences and enhance decision making in smart cities, but at the risk of bias and abuse.
"Business" Newspaper with geometric shapes overlaying it

How Companies Are Leveraging Microsoft Azure’s IoT Hub

The article details how Microsoft Azure has been used by some of the biggest companies in the world to incorporate IoT into their products.