DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Security Protocol and Data Model (SPDM) Architecture White Paper

September 26, 2022

Security Protocol and Data Model
This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Spotlight

Kryptus EED SA

Founded in 2003 in the city of Campinas/SP, Brazil, Kryptus develops, integrates and deploys a wide array of solutions for hardware, firmware and software, ranging from semiconductors to complex digital certificate management systems, having a highly specialized technical team on cryptographic engineering and information security. Kryptus was named as "Gartner Cool Vendor Brazil 2014" by Gartner, Inc. Kryptus pioneered the field of semiconductors for cryptographic applications in Brazil by introducing the first ASIC AES accelerator. Recently, Kryptus cryptographic module ASI-HSM was the first and is the only HSM to be approved by ITI at its maximum security (MCT7 NSH3), promoting an import step in the Brazilian cryptographic hardware market.

OTHER WHITEPAPERS
news image

Ransomware: How to prevent, predict, detect & respond

whitePaper | January 9, 2020

The malicious programs known as ransomware have attracted a significant amount of coverage in the mainstream media over the last few years, as major companies and organizations announced that their operations had been affected by the threat. Examples of affected businesses include hospitals, universities and major international corporations [2, 3]. Despite the alarming nature of the threat, the way ransomware gains entry onto a user’s device is actually no different from the methods used by other threats. Ransomware is most commonly spread by two methods.

Read More
news image

IoT Cybersecurity vision 2018-2019

whitePaper | November 6, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by several analysts.

Read More
news image

Remote Support Security Whitepaper

whitePaper | October 21, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with a better end-user support experience.

Read More
news image

Password Safe Cloud 22.2 Security Whitepaper

whitePaper | August 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to their organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with a better end-user support experience.

Read More
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

XDR vs. SIEM: A Cybersecurity Leader’s Guide

whitePaper | December 27, 2022

As threats intensify and SecOps teams are called upon to defend digital environments that keep growing in size and complexity, and with a defensible perimeter that has all but disappeared, cybersecurity vendors are responding with a new generation of software and service solutions.

Read More

Spotlight

Kryptus EED SA

Founded in 2003 in the city of Campinas/SP, Brazil, Kryptus develops, integrates and deploys a wide array of solutions for hardware, firmware and software, ranging from semiconductors to complex digital certificate management systems, having a highly specialized technical team on cryptographic engineering and information security. Kryptus was named as "Gartner Cool Vendor Brazil 2014" by Gartner, Inc. Kryptus pioneered the field of semiconductors for cryptographic applications in Brazil by introducing the first ASIC AES accelerator. Recently, Kryptus cryptographic module ASI-HSM was the first and is the only HSM to be approved by ITI at its maximum security (MCT7 NSH3), promoting an import step in the Brazilian cryptographic hardware market.

Events