SlideShare a Scribd company logo
1 of 36
Download to read offline
Security Hardware Differentiated
Through Licensed Software

High-Tech Manufacturer’s Case Study
Agenda

• CPU Tech Market
• Company Overview
• Product Overview
• Customer Development Cycle
• Flexera Software Licensing to Support Development
Agenda

• CPU Tech Market
• Company Overview
• Product Overview
• Customer Development Cycle
• Flexera Software Licensing to Support Development
Electronics Component Markets
•   Semiconductor Markets in 2011, Gartner:
      –Overall estimate about $320 Billion
      –Processor-based chips: $144 Billion
      –Military/Industrial Market, System-on-Chip, 32-bit+: $500
       Million, 20% CAGR

•   Of the entire semi-conductor market:
        “System-on-Chip Products Will Drive Growth”
Numerous Recent Security Threats
Pendulum Swings in Defense Electronics over
   Time
                                                           Commercial
                                                                                                                             Military Driven
                        Proliferation of
                                                     Aviation and Auto
                                                    Markets Proliferate
                                                                                                         IP Protection           Market
                        Performance                                                                         Concerns
                        Standards                                                                        (Anti-Tamper
                                                                  Dual Use                                  Required)
                                                               Components
                  Custom                                         Proliferate                     Commercial
                  Components               Full MIL-STD                                         Cryptography
                                           Requirements                                           Proliferates
                                                                          ‘Perry Memo’
                                                                            COTS and
                                                                          Open Source           Trust
       Rise in Intelligence
                                                                                            Concerns
       And Cryptography
                                                                             Defense Open (US Sources
                                                                              Sources and   Required)                     Defense
                                                                             Architectures                                Funding
      War-Time                                                                                                            Priorities
      Mobilization                                                                        Availability
                                                                                           Concerns
                                                                                         (US Sources
                                                                                           Required)
No Distinct
Military Market



                                                                          Tech Boom Marginalizes
                                                                           Military Requirements                         Commercial Driven
                                                                                                                             Market
Agenda

• CPU Tech Market
• Company Overview
• Product Overview
• Customer Development Cycle
• Flexera Software Licensing to Support Development
What We Do: Develop Secure and Compatible
Technology
                                                                    Understanding
                                                                    how to build
                                                                    secure systems
 CPU Tech’s Proven Approach

                 CPU Tech
               Founded 1989




                                                                    Understanding
                                                                    how to design
                                                                    secure systems
                                                                    and eliminate
                                             Understanding System   vulnerabilities
                                             Vulnerabilities




1980    1985        1990      1995   2000   2005           2010
Who We Are: Products and Services                                     Clients and Partners


•   Founded in 1989 with a vision of making compatible System-on-a-
    Chip (SoC) technology economically practical

•   CPU Tech produces the Acalis® family of
    Secure Processors that protect software and
    systems from reverse engineering

•   CPU Tech offers secure processing implementation services to
    assist customers in achieving security goals and certifications

•   Veteran Owned, Small Business, Headquartered in Pleasanton, CA
    – Rep Firms across America
Agenda

• CPU Tech Market
• Company Overview
• Product Overview
• Customer Development Cycle
• Flexera Software Licensing to Support Development
Acalis® CPU872 Secure Processor
•   Multi-Core Device with Integrated
    Security Processor & Offload
    Engines
•   IBM Trusted Foundry
•   Extensive, Multi-Layered Security to
    Protect Against Reverse Engineering
•   Two Complete PowerPC® Nodes
•   Scalable without Additional Devices
•   Power Efficient Processing
Acalis® Development Environment

H Acalis® CPU872           H Acalis® EB872
 Secure Processor              Evaluation
                                 Board




S Security Processor API                                     T       Acalis®
                                                                    Software
                                                                 Development Kit




                            T    Acalis
     S Embedded RTOS/OS         SentryTM     H   Hardware: Devices & Boards

                                             S   Software: Embedded User Software

                                             T   Development Tools: Software Developer & Security Engineer Tools
Acalis Sentry™ Advantages

•   Graphical User Interface: Offers menu-driven, easy-to-use security
    configuration

•   Secure Data Transfer: Mocana SSL data security and authentication

•   Security Engineer Role: Clearly separates security role from software
    developer role

•   Access Rules: Provides clear implementation of settings on chip firewalls
    between processors, IO, and on-chip/off-chip memory

•   Trusted Source Environment: Adds hardware trust to your design environment
    in critical areas of encryption key and boot code management
How Acalis Sentry™ Works
Acalis® Design Environment

 Acalis Sentry™ Management Console                                                                                  Acalis® IDE


                                                                     Network


                             Sentry Connection –




                                                   Security Config
                                                                                      – Sentry Connection




                                                                     S/W Encryption
                                                                                                            Boot Image


                                                                                                             AEC+AES
                                                                                                             Encrypted
                                                                                                              Image

                        Acalis Sentry™
The Role of a Security Engineer
                                    •   Current Role/Responsibilities
Acalis Sentry™ Management Console         – Deeply embedded in software design
                                          – Line-by-line verification
                                          – Constant revision of design practices

                                    With Acalis SentryTM Security Server…

                                    •   New Role/Responsibilities
                                          – Security separated from software design
                                          – Menu-defined security decisions
                                          – Clearly defined constraints for software
                                            designers
                                          – Simplifies „what-if‟ scenarios when changing
                                            security requirements
Agenda

• CPU Tech Market
• Company Overview
• Product Overview
• Customer Development Cycle
• Flexera Software Licensing to Support Development
Defense Acquisition Process
       Programs have extensive Government reviews and milestones
Phases of Defense Customer Development

                                Design
                                                         System
Requirements   System Design      and      Integration             Manufacturing/Support
                                                          Test
                               Prototype




• This Life-Cycle can be 5-10 Years for Defense Programs
• The Full Function of Acalis Sentry not Required in All Phases
• There are sometimes security concerns in design
      – Not everyone in integration, test, or manufacturing need to understand sensitive design
        details
      – Some security settings are „locked down‟ for the remainder of the program
      – Some programs „compartmentalized‟, where engineers and users have different accesses
Supply Chain Security

• The fact that „Supply Chain‟ pieces are now global is a concern to some
  defense officials
• White House Issued „Comprehensive National Cyber Security Initiative‟
  (CNCI) and Declassified in 2010
• Part of the CNCI is Supply Chain Security:
    – “Risks stemming from both the domestic and globalized supply chain must be managed in a
      strategic and comprehensive way over the entire lifecycle of products, systems and services. “
      – CNCI Initiative #11


    Acalis Sentry is a customer offering by CPU Tech to help secure the
             supply chain in the development process through
                       role and feature based licensing
Agenda

• CPU Tech Market
• Company Overview
• Product Overview
• Customer Development Cycle
• Flexera Software Licensing to Support Development
Overview of Flexera Software Capabilities
•   CPU Tech currently utilizing several Flexera Software products

•   For the Acalis Sentry, using:
      – FlexNet Embedded
      – FlexNet Operations


•   This enables us to license several different „subscription
    licenses‟ to Acalis Sentry all from the same secure hardware
CPU Tech’s Business Challenges

• Both desktop and embedded software provide different levels of
  functionality, operations, and security
• Need to offer feature-based and role-based licensing and
  pricing models to our customers
• Need to provide embedded-node-locked and floating licensing
  capability
• Need to offer both off-line (for machines operating in a classified
  area) and web-based activation options to our customers
• Need to be able to automate the activation process
CPU Tech’s Evaluation Criteria in Selecting
FlexNet Producer Suite
• Appropriate and adequate cryptographic encryption for license
  key protection and storage
• Small memory footprint
• Supported our processor architecture
• Supported embedded OS‟s (OS independent, and easy to port)
• Supported programming language
• Performance and reliability
• Easy to manage and track the license entitlement
• License activation automation
• Integration with other management systems, such as
  SalesForce
• Total Cost of Ownership
Example Use Case of FlexNet Technology Embedded in
Acalis Sentry
                    Admin   Developer    Security
                                                    How License
  Acalis® EB872
                                         Engineer   Works
 Evaluation Board
                                                      License Resides
                                                      in Bootable
                                                      Embedded
                                                      Software
                                                      Determines
                                                      Accesses and
                                                      Privileges Based
  Active                                              on Edition
 License
                                                      License pre-
                                                      installed or
                                                      updated by user
                                    Manufacturing
  Acalis SentryTM
Future Capabilities Enabled by FlexNet Embedded

                              Admin    Developer Security Engineer
  Acalis® EB872
                                                                        Options:
 Evaluation Board
                                                                          Off-line activation
                                                                           locked to device
                                                                          Floating license
                                                                           on a license
                                                                           server
                                                                          Provisioning
                                                                           server to
                        Provisioning or                                    automate the
                       Generated License
                                                                           license update
                                                                          Web-based
                                                                           license activation
Acalis SentryTM Acalis SentryTM                         Manufacturing
Role and Mode Rules for Acalis Sentry

Roles Needed in Acalis Sentry:           Design Phases for Acalis Sentry:
•   Administrator: Sets passwords,       • Development: This encompasses all
    administrative options, license       software development, requires
    activities                            multiple changes and security settings
•   Developer: Provides mission          • Test/Integration: This phase requires
    embedded software, final embedded     some controlled code and security
    images                                setting changes
•   Security Engineer: Sets security     • Manufacturing: This phase requires
    settings in secure processor          no code changes, but controls sensitive
•   Manufacturer: Final distributor of    image distribution
    encrypted bootable image             • Support: This phase typically involves
                                          only documentation, audit, reports
Matching Roles/Modes to Customer Design Model

                                  Design
                                                                  System
 Requirements   System Design       and          Integration                 Manufacturing/Support
                                                                   Test
                                 Prototype

                             Full Sentry
                                       Assembly Creation
  Results in
                                                   Manufacturing
    Four
                                                                                      Static
‘Subscription                           Assembly
  Licenses’ Full Sentry                 Creation                Manufacturing         Static
                 • Admin, Developer,    •   Admin, Developer,   • Admin,              • Admin, Security
                   Security Engineer,       Security Engineer     Manufacturing         Engineer
                   Manufacturing
                                        • New images result • Unchanging              • Security audit only –
                 • Full spectrum of
                                            from debug            image(s) being        keeps production
                   design space             changes               installed             floor intact, no other
                   needed                                                               functions
Matrix of Features to Subscription Licenses
                                                Assembly
       FeaturesSubscriptions            Full              Manufacturing   Static
                                                Creation
Product Activation                        √        √            √            √
Configuration (locking/unlocking,
network)                                  √        √            √            √
Licensing (activation, update)            √        √            √            √
Field Upgrade                             √        √            √            √
Tamper and Activity Log (storing,
retrieving)                               √        √            √            √
Device Sanitization                       √        √            √            √
Access Configuration (user group,
users)                                    √        √            √            √
Security Configuration (firewall, key,
event log)                                √        √            √            √
Assembly Creation                         √        √
Assembly Upgrade                          √        √
Target Activity Log Retrieval             √        √            √            √
Manufacturing Process                     √                     √            √
Features, Subscriptions, and Roles – Security Engineer
                                                Assembly
       FeaturesSubscriptions            Full              Manufacturing   Static
                                                Creation
Product Activation                        √        √            √            √
Configuration (locking/unlocking,
network)
Licensing (activation, update)

Field Upgrade                             √        √            √            √
Tamper and Activity Log (storing,
retrieving)
Device Sanitization
Access Configuration (user group,
users)
Security Configuration (firewall, key,
event log)                                √        √            √            √
Assembly Creation                         √        √
Assembly Upgrade                          √        √
Target Activity Log Retrieval             √        √            √            √
Manufacturing Process                     √                     √            √
Features, Subscriptions, and Roles – Administrator
                                                Assembly
       FeaturesSubscriptions            Full              Manufacturing   Static
                                                Creation
Product Activation                        √        √            √            √
Configuration (locking/unlocking,
network)                                  √        √            √            √
Licensing (activation, update)            √        √            √            √
Field Upgrade                             √        √            √            √
Tamper and Activity Log (storing,
retrieving)                               √        √            √            √
Device Sanitization                       √        √            √            √
Access Configuration (user group,
users)                                    √        √            √            √
Security Configuration (firewall, key,
event log)
Assembly Creation

Assembly Upgrade

Target Activity Log Retrieval

Manufacturing Process
Features, Subscriptions, and Roles – Developer
                                                Assembly
       FeaturesSubscriptions            Full              Manufacturing   Static
                                                Creation
Product Activation
Configuration (locking/unlocking,
network)
Licensing (activation, update)

Field Upgrade
Tamper and Activity Log (storing,
retrieving)
Device Sanitization
Access Configuration (user group,
users)
Security Configuration (firewall, key,
event log)
Assembly Creation                         √        √
Assembly Upgrade                          √        √
Target Activity Log Retrieval             √        √
Manufacturing Process
Features, Subscriptions, and Roles – Manufacturer
                                                Assembly
       FeaturesSubscriptions            Full              Manufacturing   Static
                                                Creation
Product Activation
Configuration (locking/unlocking,
network)
Licensing (activation, update)

Field Upgrade
Tamper and Activity Log (storing,
retrieving)
Device Sanitization
Access Configuration (user group,
users)
Security Configuration (firewall, key,
event log)
Assembly Creation

Assembly Upgrade

Target Activity Log Retrieval             √                     √
Manufacturing Process                     √                     √            √
Cost Advantages of Flexera Software Licensing
Model in Sentry
• Reduces Manufacturing Cost (Single Version of Hardware)
• Adds a Valuable Security Layer in User Activation
• Operational Savings in Ease up Upgrade/Downgrade
• Flexibility allows CPU Tech to Tailor Subscription Licenses to
  Customer
• Protects CPU Tech and Customer Intellectual Property
• Gets us Faster to Market, as we are only limited by hardware
  schedule
Example Cost Model to Customer
 Cost model allows customers to customize their licensing
          package and increase design security

                                   Design and                   System
 Requirements    System Design                    Integration            Manufacturing/Support
                                   Prototype                     Test

                                 Full Sentry
                                                Assembly Creation
                                                              Manufacturing
                Example:                                                          Static
                   – Two Yrs Fully Sentry (2 x $A)
                   – Two Yrs Assembly Creation (2 x $B)
                   – Three Yrs Manufacturing (3 x $C)
                   – Five Yrs Static (5 x $D)
                                      Total Cost: $XYZ
Summary
• Flexible Licensing helps customer with life-cycle security
• Allows for cost and revenue model that matches customer
  process
• Much of what were security „rules‟ to be enforced through audit
  are now enforced by fiat
• Customers can play by our licensing rules within their secure
  facilities
• Provides flexibility, cost reduction, and ease of
  upgrade/downgrade
• Offers protection for intellectual property and revenue
Questions?

Thank You!

More Related Content

Viewers also liked

化学课件
化学课件化学课件
化学课件bruce72
 
Smart Response VE
Smart Response VESmart Response VE
Smart Response VEMatt Strine
 
College Students Say the Darnedest Things
College Students Say the Darnedest ThingsCollege Students Say the Darnedest Things
College Students Say the Darnedest ThingsAndy Carswell
 
Certificación a grado 2012-II PNFE
Certificación a grado 2012-II PNFECertificación a grado 2012-II PNFE
Certificación a grado 2012-II PNFEDavid Leon Sicilia
 
Entitlement Hub Build, Test and Deploy
Entitlement Hub Build, Test and DeployEntitlement Hub Build, Test and Deploy
Entitlement Hub Build, Test and DeployFlexera
 
Fixing Design-Time Validation Errors
Fixing Design-Time Validation ErrorsFixing Design-Time Validation Errors
Fixing Design-Time Validation ErrorsFlexera
 
Métricas para código fuente y pruebas orientadas a objeto
Métricas para código fuente y pruebas orientadas a objetoMétricas para código fuente y pruebas orientadas a objeto
Métricas para código fuente y pruebas orientadas a objetoDavid Leon Sicilia
 
Invisible Exhibitor - MAYA Design
Invisible Exhibitor - MAYA DesignInvisible Exhibitor - MAYA Design
Invisible Exhibitor - MAYA DesignErik Dahl
 
Copyright © and fair use
Copyright © and fair useCopyright © and fair use
Copyright © and fair usemrecord
 
Common Licensing Following Mergers and Acquisitions
Common Licensing Following Mergers and AcquisitionsCommon Licensing Following Mergers and Acquisitions
Common Licensing Following Mergers and AcquisitionsFlexera
 
Crafting Virtual Space
Crafting Virtual SpaceCrafting Virtual Space
Crafting Virtual SpaceArthur Hash
 

Viewers also liked (20)

Slideshare turkey
Slideshare turkeySlideshare turkey
Slideshare turkey
 
化学课件
化学课件化学课件
化学课件
 
Turkey report
Turkey reportTurkey report
Turkey report
 
Smart Response VE
Smart Response VESmart Response VE
Smart Response VE
 
Fall 2014 NYJL Sustainer Slideshow
Fall 2014 NYJL Sustainer SlideshowFall 2014 NYJL Sustainer Slideshow
Fall 2014 NYJL Sustainer Slideshow
 
College Students Say the Darnedest Things
College Students Say the Darnedest ThingsCollege Students Say the Darnedest Things
College Students Say the Darnedest Things
 
Mib Entrepreneurs Factory
Mib Entrepreneurs FactoryMib Entrepreneurs Factory
Mib Entrepreneurs Factory
 
Certificación a grado 2012-II PNFE
Certificación a grado 2012-II PNFECertificación a grado 2012-II PNFE
Certificación a grado 2012-II PNFE
 
Entitlement Hub Build, Test and Deploy
Entitlement Hub Build, Test and DeployEntitlement Hub Build, Test and Deploy
Entitlement Hub Build, Test and Deploy
 
Fixing Design-Time Validation Errors
Fixing Design-Time Validation ErrorsFixing Design-Time Validation Errors
Fixing Design-Time Validation Errors
 
Slave Narratives
Slave NarrativesSlave Narratives
Slave Narratives
 
Métricas para código fuente y pruebas orientadas a objeto
Métricas para código fuente y pruebas orientadas a objetoMétricas para código fuente y pruebas orientadas a objeto
Métricas para código fuente y pruebas orientadas a objeto
 
melnic
melnicmelnic
melnic
 
Metricas orientadas a objeto
Metricas orientadas a objetoMetricas orientadas a objeto
Metricas orientadas a objeto
 
Sweden final report
Sweden final reportSweden final report
Sweden final report
 
Fever the musical! 1
Fever the musical! 1Fever the musical! 1
Fever the musical! 1
 
Invisible Exhibitor - MAYA Design
Invisible Exhibitor - MAYA DesignInvisible Exhibitor - MAYA Design
Invisible Exhibitor - MAYA Design
 
Copyright © and fair use
Copyright © and fair useCopyright © and fair use
Copyright © and fair use
 
Common Licensing Following Mergers and Acquisitions
Common Licensing Following Mergers and AcquisitionsCommon Licensing Following Mergers and Acquisitions
Common Licensing Following Mergers and Acquisitions
 
Crafting Virtual Space
Crafting Virtual SpaceCrafting Virtual Space
Crafting Virtual Space
 

Similar to Security Hardware Differentiated Through Licensed Software: a High-Tech Manufacturer’s Case Study

EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarErin Banks
 
Asigra Product Marketing Strategy
Asigra Product Marketing StrategyAsigra Product Marketing Strategy
Asigra Product Marketing StrategyJas Mann
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013John Weiler
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionIxia
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingOpSource
 
Rosetta ip commercialization panel
Rosetta ip commercialization panelRosetta ip commercialization panel
Rosetta ip commercialization panelDesign And Reuse
 
Trusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.pptTrusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.pptnaghamallella
 
Winmate Company Profile
Winmate Company ProfileWinmate Company Profile
Winmate Company ProfileWinmate Inc.
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Houcheng Lee
 
Emmbedding Oracle
Emmbedding OracleEmmbedding Oracle
Emmbedding Oracledidemtopuz
 
Cav Taguchi autosec china slides
Cav Taguchi autosec china slidesCav Taguchi autosec china slides
Cav Taguchi autosec china slidesKenji Taguchi
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?Alan Tatourian
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidiszakmackraken
 
Sell it in it industry i gip
Sell it in it industry i gipSell it in it industry i gip
Sell it in it industry i gipmaggie4667
 
Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011John Weiler
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 
Cloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process PhaseCloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process Phasefinteligent
 
Smart Clouds for Smart Companies
Smart Clouds for Smart CompaniesSmart Clouds for Smart Companies
Smart Clouds for Smart CompaniesPeter Coffee
 

Similar to Security Hardware Differentiated Through Licensed Software: a High-Tech Manufacturer’s Case Study (20)

EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey Webinar
 
Asigra Product Marketing Strategy
Asigra Product Marketing StrategyAsigra Product Marketing Strategy
Asigra Product Marketing Strategy
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013
 
Tomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure TodayTomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure Today
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
 
Presentation 3
Presentation 3Presentation 3
Presentation 3
 
Rosetta ip commercialization panel
Rosetta ip commercialization panelRosetta ip commercialization panel
Rosetta ip commercialization panel
 
Trusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.pptTrusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.ppt
 
Winmate Company Profile
Winmate Company ProfileWinmate Company Profile
Winmate Company Profile
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)
 
Emmbedding Oracle
Emmbedding OracleEmmbedding Oracle
Emmbedding Oracle
 
Cav Taguchi autosec china slides
Cav Taguchi autosec china slidesCav Taguchi autosec china slides
Cav Taguchi autosec china slides
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidis
 
Sell it in it industry i gip
Sell it in it industry i gipSell it in it industry i gip
Sell it in it industry i gip
 
Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
Cloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process PhaseCloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process Phase
 
Smart Clouds for Smart Companies
Smart Clouds for Smart CompaniesSmart Clouds for Smart Companies
Smart Clouds for Smart Companies
 

More from Flexera

Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Flexera
 
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyFlexera
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT EnvironmentFlexera
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceFlexera
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementFlexera
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First StrategyFlexera
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareFlexera
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewFlexera
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Flexera
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityFlexera
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Flexera
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Flexera
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Flexera
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Flexera
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2Flexera
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins FlexeraFlexera
 
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera
 
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Flexera
 
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsKeeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsFlexera
 
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseDo You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseFlexera
 

More from Flexera (20)

Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
 
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins Flexera
 
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?
 
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
 
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsKeeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
 
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseDo You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Security Hardware Differentiated Through Licensed Software: a High-Tech Manufacturer’s Case Study

  • 1. Security Hardware Differentiated Through Licensed Software High-Tech Manufacturer’s Case Study
  • 2. Agenda • CPU Tech Market • Company Overview • Product Overview • Customer Development Cycle • Flexera Software Licensing to Support Development
  • 3. Agenda • CPU Tech Market • Company Overview • Product Overview • Customer Development Cycle • Flexera Software Licensing to Support Development
  • 4. Electronics Component Markets • Semiconductor Markets in 2011, Gartner: –Overall estimate about $320 Billion –Processor-based chips: $144 Billion –Military/Industrial Market, System-on-Chip, 32-bit+: $500 Million, 20% CAGR • Of the entire semi-conductor market: “System-on-Chip Products Will Drive Growth”
  • 6. Pendulum Swings in Defense Electronics over Time Commercial Military Driven Proliferation of Aviation and Auto Markets Proliferate IP Protection Market Performance Concerns Standards (Anti-Tamper Dual Use Required) Components Custom Proliferate Commercial Components Full MIL-STD Cryptography Requirements Proliferates ‘Perry Memo’ COTS and Open Source Trust Rise in Intelligence Concerns And Cryptography Defense Open (US Sources Sources and Required) Defense Architectures Funding War-Time Priorities Mobilization Availability Concerns (US Sources Required) No Distinct Military Market Tech Boom Marginalizes Military Requirements Commercial Driven Market
  • 7. Agenda • CPU Tech Market • Company Overview • Product Overview • Customer Development Cycle • Flexera Software Licensing to Support Development
  • 8. What We Do: Develop Secure and Compatible Technology Understanding how to build secure systems CPU Tech’s Proven Approach CPU Tech Founded 1989 Understanding how to design secure systems and eliminate Understanding System vulnerabilities Vulnerabilities 1980 1985 1990 1995 2000 2005 2010
  • 9. Who We Are: Products and Services Clients and Partners • Founded in 1989 with a vision of making compatible System-on-a- Chip (SoC) technology economically practical • CPU Tech produces the Acalis® family of Secure Processors that protect software and systems from reverse engineering • CPU Tech offers secure processing implementation services to assist customers in achieving security goals and certifications • Veteran Owned, Small Business, Headquartered in Pleasanton, CA – Rep Firms across America
  • 10. Agenda • CPU Tech Market • Company Overview • Product Overview • Customer Development Cycle • Flexera Software Licensing to Support Development
  • 11. Acalis® CPU872 Secure Processor • Multi-Core Device with Integrated Security Processor & Offload Engines • IBM Trusted Foundry • Extensive, Multi-Layered Security to Protect Against Reverse Engineering • Two Complete PowerPC® Nodes • Scalable without Additional Devices • Power Efficient Processing
  • 12. Acalis® Development Environment H Acalis® CPU872 H Acalis® EB872 Secure Processor Evaluation Board S Security Processor API T Acalis® Software Development Kit T Acalis S Embedded RTOS/OS SentryTM H Hardware: Devices & Boards S Software: Embedded User Software T Development Tools: Software Developer & Security Engineer Tools
  • 13. Acalis Sentry™ Advantages • Graphical User Interface: Offers menu-driven, easy-to-use security configuration • Secure Data Transfer: Mocana SSL data security and authentication • Security Engineer Role: Clearly separates security role from software developer role • Access Rules: Provides clear implementation of settings on chip firewalls between processors, IO, and on-chip/off-chip memory • Trusted Source Environment: Adds hardware trust to your design environment in critical areas of encryption key and boot code management
  • 14. How Acalis Sentry™ Works Acalis® Design Environment Acalis Sentry™ Management Console Acalis® IDE Network Sentry Connection – Security Config – Sentry Connection S/W Encryption Boot Image AEC+AES Encrypted Image Acalis Sentry™
  • 15. The Role of a Security Engineer • Current Role/Responsibilities Acalis Sentry™ Management Console – Deeply embedded in software design – Line-by-line verification – Constant revision of design practices With Acalis SentryTM Security Server… • New Role/Responsibilities – Security separated from software design – Menu-defined security decisions – Clearly defined constraints for software designers – Simplifies „what-if‟ scenarios when changing security requirements
  • 16. Agenda • CPU Tech Market • Company Overview • Product Overview • Customer Development Cycle • Flexera Software Licensing to Support Development
  • 17. Defense Acquisition Process Programs have extensive Government reviews and milestones
  • 18. Phases of Defense Customer Development Design System Requirements System Design and Integration Manufacturing/Support Test Prototype • This Life-Cycle can be 5-10 Years for Defense Programs • The Full Function of Acalis Sentry not Required in All Phases • There are sometimes security concerns in design – Not everyone in integration, test, or manufacturing need to understand sensitive design details – Some security settings are „locked down‟ for the remainder of the program – Some programs „compartmentalized‟, where engineers and users have different accesses
  • 19. Supply Chain Security • The fact that „Supply Chain‟ pieces are now global is a concern to some defense officials • White House Issued „Comprehensive National Cyber Security Initiative‟ (CNCI) and Declassified in 2010 • Part of the CNCI is Supply Chain Security: – “Risks stemming from both the domestic and globalized supply chain must be managed in a strategic and comprehensive way over the entire lifecycle of products, systems and services. “ – CNCI Initiative #11 Acalis Sentry is a customer offering by CPU Tech to help secure the supply chain in the development process through role and feature based licensing
  • 20. Agenda • CPU Tech Market • Company Overview • Product Overview • Customer Development Cycle • Flexera Software Licensing to Support Development
  • 21. Overview of Flexera Software Capabilities • CPU Tech currently utilizing several Flexera Software products • For the Acalis Sentry, using: – FlexNet Embedded – FlexNet Operations • This enables us to license several different „subscription licenses‟ to Acalis Sentry all from the same secure hardware
  • 22. CPU Tech’s Business Challenges • Both desktop and embedded software provide different levels of functionality, operations, and security • Need to offer feature-based and role-based licensing and pricing models to our customers • Need to provide embedded-node-locked and floating licensing capability • Need to offer both off-line (for machines operating in a classified area) and web-based activation options to our customers • Need to be able to automate the activation process
  • 23. CPU Tech’s Evaluation Criteria in Selecting FlexNet Producer Suite • Appropriate and adequate cryptographic encryption for license key protection and storage • Small memory footprint • Supported our processor architecture • Supported embedded OS‟s (OS independent, and easy to port) • Supported programming language • Performance and reliability • Easy to manage and track the license entitlement • License activation automation • Integration with other management systems, such as SalesForce • Total Cost of Ownership
  • 24. Example Use Case of FlexNet Technology Embedded in Acalis Sentry Admin Developer Security How License Acalis® EB872 Engineer Works Evaluation Board  License Resides in Bootable Embedded Software  Determines Accesses and Privileges Based Active on Edition License  License pre- installed or updated by user Manufacturing Acalis SentryTM
  • 25. Future Capabilities Enabled by FlexNet Embedded Admin Developer Security Engineer Acalis® EB872 Options: Evaluation Board  Off-line activation locked to device  Floating license on a license server  Provisioning server to Provisioning or automate the Generated License license update  Web-based license activation Acalis SentryTM Acalis SentryTM Manufacturing
  • 26. Role and Mode Rules for Acalis Sentry Roles Needed in Acalis Sentry: Design Phases for Acalis Sentry: • Administrator: Sets passwords, • Development: This encompasses all administrative options, license software development, requires activities multiple changes and security settings • Developer: Provides mission • Test/Integration: This phase requires embedded software, final embedded some controlled code and security images setting changes • Security Engineer: Sets security • Manufacturing: This phase requires settings in secure processor no code changes, but controls sensitive • Manufacturer: Final distributor of image distribution encrypted bootable image • Support: This phase typically involves only documentation, audit, reports
  • 27. Matching Roles/Modes to Customer Design Model Design System Requirements System Design and Integration Manufacturing/Support Test Prototype Full Sentry Assembly Creation Results in Manufacturing Four Static ‘Subscription Assembly Licenses’ Full Sentry Creation Manufacturing Static • Admin, Developer, • Admin, Developer, • Admin, • Admin, Security Security Engineer, Security Engineer Manufacturing Engineer Manufacturing • New images result • Unchanging • Security audit only – • Full spectrum of from debug image(s) being keeps production design space changes installed floor intact, no other needed functions
  • 28. Matrix of Features to Subscription Licenses Assembly FeaturesSubscriptions Full Manufacturing Static Creation Product Activation √ √ √ √ Configuration (locking/unlocking, network) √ √ √ √ Licensing (activation, update) √ √ √ √ Field Upgrade √ √ √ √ Tamper and Activity Log (storing, retrieving) √ √ √ √ Device Sanitization √ √ √ √ Access Configuration (user group, users) √ √ √ √ Security Configuration (firewall, key, event log) √ √ √ √ Assembly Creation √ √ Assembly Upgrade √ √ Target Activity Log Retrieval √ √ √ √ Manufacturing Process √ √ √
  • 29. Features, Subscriptions, and Roles – Security Engineer Assembly FeaturesSubscriptions Full Manufacturing Static Creation Product Activation √ √ √ √ Configuration (locking/unlocking, network) Licensing (activation, update) Field Upgrade √ √ √ √ Tamper and Activity Log (storing, retrieving) Device Sanitization Access Configuration (user group, users) Security Configuration (firewall, key, event log) √ √ √ √ Assembly Creation √ √ Assembly Upgrade √ √ Target Activity Log Retrieval √ √ √ √ Manufacturing Process √ √ √
  • 30. Features, Subscriptions, and Roles – Administrator Assembly FeaturesSubscriptions Full Manufacturing Static Creation Product Activation √ √ √ √ Configuration (locking/unlocking, network) √ √ √ √ Licensing (activation, update) √ √ √ √ Field Upgrade √ √ √ √ Tamper and Activity Log (storing, retrieving) √ √ √ √ Device Sanitization √ √ √ √ Access Configuration (user group, users) √ √ √ √ Security Configuration (firewall, key, event log) Assembly Creation Assembly Upgrade Target Activity Log Retrieval Manufacturing Process
  • 31. Features, Subscriptions, and Roles – Developer Assembly FeaturesSubscriptions Full Manufacturing Static Creation Product Activation Configuration (locking/unlocking, network) Licensing (activation, update) Field Upgrade Tamper and Activity Log (storing, retrieving) Device Sanitization Access Configuration (user group, users) Security Configuration (firewall, key, event log) Assembly Creation √ √ Assembly Upgrade √ √ Target Activity Log Retrieval √ √ Manufacturing Process
  • 32. Features, Subscriptions, and Roles – Manufacturer Assembly FeaturesSubscriptions Full Manufacturing Static Creation Product Activation Configuration (locking/unlocking, network) Licensing (activation, update) Field Upgrade Tamper and Activity Log (storing, retrieving) Device Sanitization Access Configuration (user group, users) Security Configuration (firewall, key, event log) Assembly Creation Assembly Upgrade Target Activity Log Retrieval √ √ Manufacturing Process √ √ √
  • 33. Cost Advantages of Flexera Software Licensing Model in Sentry • Reduces Manufacturing Cost (Single Version of Hardware) • Adds a Valuable Security Layer in User Activation • Operational Savings in Ease up Upgrade/Downgrade • Flexibility allows CPU Tech to Tailor Subscription Licenses to Customer • Protects CPU Tech and Customer Intellectual Property • Gets us Faster to Market, as we are only limited by hardware schedule
  • 34. Example Cost Model to Customer Cost model allows customers to customize their licensing package and increase design security Design and System Requirements System Design Integration Manufacturing/Support Prototype Test Full Sentry Assembly Creation Manufacturing Example: Static – Two Yrs Fully Sentry (2 x $A) – Two Yrs Assembly Creation (2 x $B) – Three Yrs Manufacturing (3 x $C) – Five Yrs Static (5 x $D) Total Cost: $XYZ
  • 35. Summary • Flexible Licensing helps customer with life-cycle security • Allows for cost and revenue model that matches customer process • Much of what were security „rules‟ to be enforced through audit are now enforced by fiat • Customers can play by our licensing rules within their secure facilities • Provides flexibility, cost reduction, and ease of upgrade/downgrade • Offers protection for intellectual property and revenue