Cog Systems’ Secure Virtualization Available in Qualcomm Snapdragon Platforms

IoT For All

Cybersecurity software provider Cog Systems, leaders in securing IoT, has been chosen by Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, to provide virtualization-based security for its Qualcomm® Snapdragon™ platforms, in a collaboration agreement announced by the company today.

Cog’s security and virtualization APIs will be available in select Snapdragon mobile platforms, including the recently launched Snapdragon 855. This will enable connected devices, such as Android phones and IoT devices, to access Cog’s virtualized modular security technology, known as D4 Secure.

D4 Secure is a security and virtualization platform for connected devices that offers uncompromised performance and flexibility. Cog’s virtualization enables end-point innovation through modularity and provides a platform for myriad Applications like advanced biometrics, AI and machine learning algorithms, simultaneous dual OS, and others without compromising security or performance.

Cog’s products are used by more than 30 organizations globally, including General Dynamics and Northrop Grumman, as well as U.S. and international government and defense agencies. This collaboration with Qualcomm Technologies is expected to put Cog’s security into the toolkit of OEMs, and devices worldwide.

“Adding Cog’s virtualization technology to our chipset platforms enhances our already robust security and brings significant flexibility for our customers,” said Jesse Seed, Director of Product Management, Qualcomm Technologies, Inc. “Simplifying and securing the connected device ecosystem is critical and a key goal for both companies.”

“Qualcomm Technologies’ global reach will enable us to deliver secure-by-design as a global phenomenon rather than best practice,” Dr. Daniel Potts, CEO of Cog Systems says.

Snapdragon 855, combined with the Snapdragon X50 modem, has been heralded as a breakthrough for 5G networks, leading AI processing, and blazing fast performance. Cog’s ‘secure by design’ approach will further enable new Applications that can be enabled as the OEMs embrace virtualization, while ensuring security as a core component of every new design.

Virtualization is rapidly becoming recognized as a crucial security approach around the world. Research from 2018 by the University of New South Wales under the leadership of Dr. Gernot Heiser proved the long-held assumption that type 1 virtualization was the most secure approach by testing the impact the size of a device’s trusted computing base has on minimizing critical threats. They developed a modular system built on sel4 and were able to completely eliminate 40% of the critical threats from the Common Vulnerability Assessments (CVE) database, while mitigating a further 59% to one degree or another.

Published By
IoT For All
IoT For All
IoT For All is creating resources to enable companies of all sizes to leverage IoT. From technical deep-dives, to IoT ecosystem overviews, to evergreen resources, IoT For All is the best place to keep up with what's going on in IoT.
IoT For All is creating resources to enable companies of all sizes to leverage IoT. From technical deep-dives, to IoT ecosystem overviews, to evergreen resources, IoT For All is the best place to keep up with what's going on in IoT.