Arm - Experts & Thought Leaders
Latest Arm news & announcements
The Industrial IoT sector is undergoing a rapid evolution, demanding software-defined edge nodes capable of running containerized workloads on cost-effective platforms. This transformation is driven by the need for greater flexibility, reusability, security, and the ability to deploy intelligent applications directly at the edge: where data is generated. In response to this industry shift, Eurotech introduces the ReliaGATE 15A-12, a rugged IoT gateway based on the Arm® compute platform, designed to bridge the gap between embedded legacy systems and cloud-native edge computing. Operational and sustainability goals "The ReliaGATE 15A-12 was designed to align perfectly with this transition," said Marco Carrer, CTO of Eurotech. "It supports containers and modern programming languages — enabling customers to evolve from fixed-function firmware to scalable, reusable application architectures." "This product was engineered specifically to meet the needs of companies leading the charge in deploying edge intelligence to serve both operational and sustainability goals." ReliaGATE 15A-12 reflects Eurotech's product strategy ReliaGATE 15A-12 reflects Eurotech's product strategy to enable real-world digitalisation in regulated The ReliaGATE 15A-12 reflects Eurotech's product strategy to enable real-world digitalization in regulated, mission-critical industries such as water infrastructure, energy, manufacturing, and smart transportation. Its secure-by-design architecture — featuring secure boot, TPM 2.0, tamper detection, and OTA updates — ensures robustness and compliance, while its flexibility supports long-term innovation in the field. "Modernizing industrial infrastructure increasingly depends on edge platforms that deliver real-time intelligence, security, and flexibility," said Paul Williamson, Senior Vice President and General Manager, IoT Line of Business at Arm. Advantage of the Arm compute platform Williamson added: "The ReliaGATE 15A-12 takes advantage of the Arm compute platform to bring efficient, scalable intelligence to critical on-device environments. Eurotech is leading the way for industrial digitalisation at the edge, built on Arm's trusted foundation." Among its first real-world applications, the ReliaGATE 15A-12 is already supporting the digitalisation of water infrastructure, enabling remote monitoring, connected system visibility, and data-driven insights that strengthen sustainability and resilience.
Pioneering cybersecurity business, Trustonic, has announced its new membership of RISC-V International to provide increased access to hardware-backed security. Established in 2010, RISC-V International is the non-profit home of the open standard RISC-V Instruction Set Architecture (ISA), related specifications, and stakeholder community. Advanced technology systems RISC-V enables its growing community to develop custom processors for a variety of applications Now boasting more than 4,500 members across 70 different countries, RISC-V enables its growing community to develop custom processors for a variety of applications, from embedded designs to supercomputers. Established in 2012, Trustonic delivers advanced technology systems to drive innovation, protect revenue, and enhance security for device manufacturers worldwide. RISC-V security standards Through its advanced Trusted Execution Environment (TEE) Kinibi, Trustonic successfully protects 2.5 billion connected devices and counts the world’s leading automotive manufacturers, financial institutions, and mobile operators as its customers. In announcing its new membership of RISC-V, Trustonic can now support the community with hardware-backed security for chip design and manufacture. Aside from providing access to a proven, pre-integrated Secure OS solution underpinned by Kinibi, this new membership will enable the RISC-V community to adhere to the forthcoming RISC-V security standards for A class deployments, set to be announced in the near future. Standards for hardware-backed security Trustonic can now support the ward with hardware-backed security for chip design and manufacturing Andrew Till, General Manager of Secure Platform for Trustonic, confirmed: “I am delighted share that we have joined the RISC-V community. RISC-V has built up tremendous momentum over the last decade and we see many of our customers actively planning to embrace RISC-V solutions." "By becoming a member and working together on the standards for hardware-backed security we will be able to ensure that silicon vendors and device OEMs alike can implement advanced security measures knowing that their investments will be based on open standards for the long-term." RISC-V support Andrew Till added: "By adding RISC-V support to our existing ARM solutions, we are, we can provide our customers with the freedom to select the platform that is right them while being able to leverage and re-use all their existing investments in our Kinibi Secure OS platform." "This is something the team and I are incredibly excited about as Trustonic continues its journey a pioneering, global force in embedded security.” Headquartered in Cambridge, UK, Trustonic was initially created from a joint venture between ARM, Thales, and G&D.
The Connectivity Standards Alliance ("Alliance") Product Security Working Group is pleased to announce the release of their IoT (Internet of Things) Device Security Specification 1.0, with the accompanying certification program, and Product Security Verified Mark. This groundbreaking initiative aims to establish a unified IoT cybersecurity standard and certification program, providing manufacturers with a one-stop solution to certify their devices, enabling them to comply with multiple international regulations and standards more easily. Diverse international regulations "The unveiling of the IoT Device Security Specification 1.0, alongside its certification program and the Product Security Verified Mark, signals an important milestone in bolstering IoT security and building confidence with consumers," said Tobin Richardson, Alliance President & CEO of the Connectivity Standards Alliance. "By bringing together diverse international regulations into a cohesive specification, the Product Security Certification Program streamlines the process, reduces redundancy, and provides manufacturers with a singular, respected avenue for certifying their devices globally." IoT Cybersecurity baselines The Product Security Working Group aims to meet this challenge by consolidating requirements With the increasing adoption of consumer IoT devices, there is a heightened emphasis on security due to a rise in incidents involving breaches and malicious device hijackings. The Product Security Working Group aims to meet this challenge by consolidating requirements from the three most popular IoT Cybersecurity baselines from the United States, Singapore, and Europe into a single specification and certification program. This unifying effort helps manufacturers more easily and efficiently address these regulatory regimes' requirements aiming to instill confidence in consumers and regulators. Value of IoT devices "As consumers embrace the convenience and value of IoT devices, the Alliance is dedicated to helping to create more comprehensive protection for consumers. This initiative aims to establish a robust baseline for all consumer IoT devices," said Steve Hanna of Infineon Technologies AG and Chair of the Product Security Working Group Steering Committee. "The Alliance's Product Security Verified Mark and IoT Device Security Specification 1.0 will make it easier for manufacturers to address consumer IoT security requirements around the world." IoT Device Security Specification 1.0 requirements The Product Security's IoT Device Security Specification includes dozens of specific device security provisions. IoT Device Manufacturers must demonstrate compliance with those provisions, supplying justifications and evidence to an Authorized Test Laboratory with expertise in security evaluation and experience certifying products relative to this specification. Highlights of the specific requirements include: Unique identity for each IoT Device No hardcoded default passwords Secure storage of sensitive data on the Device Secure communications of security-relevant information Secure software updates throughout the support period Secure development process, including vulnerability management Public documentation regarding security, including the support period Driving requirements and specification These units spearheaded the process by driving needs and specification action Nearly 200 member companies — including Amazon, Arm, Comcast, Google, Infineon Technologies AG, NXP Semiconductors, Schneider Electric, Signify (Philips Hue and WiZ), and Silicon Labs — have collaborated, pooling related technologies, expertise, and innovations enabling the IoT Device Security Specification 1.0, the accompanying certification program, and Product Security Verified Mark to meet the diverse needs of stakeholders, including consumers, device manufacturers, and regulators. Together, these companies spearheaded the process by driving requirements and specification development and ultimately helping validate the final specification. The Product Security Certification Program and Verified Mark Product Security Verified Mark is proof a product meets the specification's security needs Encompassing a broad spectrum of smart home devices such as light bulbs, switches, thermostats, doorbell cameras, and more, the Product Security Certification Program establishes minimum requirements for IoT devices. By consolidating several international regulations into a single set of requirements, the Certification Program streamlines the process, helping manufacturers meet certification criteria from multiple countries or regions with a single evaluation. The Product Security Verified Mark is confirmation a product meets the specification's security requirements, with the goal of inspiring consumer confidence. When displayed prominently on certified product packaging, store signage, and online platforms, this Verified Mark builds trust by serving as a marker for secure IoT devices. A printed URL, hyperlink, QR code, or a combination of these representations on the Product Security Verified Mark gives consumers access to more information about the device's security features. Looking ahead As technology advances and new threats emerge, the Product Security Working Group remains committed to continuously enhancing the IoT Security Device Specification and the accompanying certification program. To learn more about how to be a part of the next generation of the IoT, visit here and become a Member of the Connectivity Standards Alliance.