Rubicon Labs Announces Security Platform for Cloud Data

By Ken Briodagh February 11, 2016

Rubicon Labs, a developer of advanced secure data protection and identity technologies for cloud-based data center applications and the IoT, has introduced TLS Armor, a hardware security platform designed to protect the execution of high-value cryptographic SSL/TLS keys in untrusted data centers.

The new product is built upon the company’s “Zero Knowledge” platform, but is an enhancement because it couples device-level software and hardware at the semiconductor level. This, the company said, will safeguard the keys that clients and servers depend on for negotiating secure connections. Those keys are transformed into values that are invisible to an attacker and never known but still usable by the CPU when wrapped with Rubicon’s Zero-Knowledge keys. When deployed in the data center, it can be used to establish secure identity and key exchanges for IoT devices through an optional software upgrade. A Rubicon Labs-based IoT key exchange executes over 3,000 times faster than an equivalent RSA 2048 bit TLS handshake.

“With cybercriminals on the prowl as never before, there is an urgent need for an entirely new generation of massively scalable and immediately available secure communications technology, unburdened by past processes and protocols,” said Dave Lundgren, CEO, Rubicon Labs

Experts increasingly agree that a new approach to accelerated authentication must withhold critical information from attackable memory in order to keep it inaccessible to would-be malicious players.

“TLS Armor is a secure hardware execution environment for high value cryptographic keys executing in the cloud, and was designed to protect the digital assets that form the foundation of a secure web,” said Rod Schultz, VP, Products, Rubicon Labs. “Unfortunately, we can no longer assume cloud-based servers are executing in a secure environment, which is why TLS Armor was designed to prevent a would-be attacker from gaining complete control of the CPU.”

Many folks are saying that the key to good security lies in building it into the hardware. I can’t agree enough. 

Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

Related Articles

Aptiv PLC Acquires Wind River Systems to Enhance Software-Defined Vehicles

By: Alex Passett    1/5/2023

Dublin-based automotive technology supplier Aptiv PLC has acquired California-based cloud software and intelligent edge company Wind River Systems.

Read More

Driver Safety and Costs Keep Decision Makers Awake

By: Greg Tavarez    12/15/2022

The two things that are top of mind for SMB fleets are driver safety and financial concerns.

Read More

Tomahawk Hosts Microsoft Azure SDK on KxM Body-Worn Edge Processor

By: Stefania Viscusi    11/10/2022

Tomahawk Robotics, a provider of common control solutions, has successfully hosted Microsoft Azure SDK on its KxM edge device.

Read More

With IoT Edge Survivability, Automated Systems Run in Real Time All the Time

By: Matthew Vulpis    9/23/2022

Enterprises are now making survivability a top priority, searching for the right edge solution that not only offers them all the technical and IoT ben…

Read More

Fuse Enhances Tactical Edge IoT Solutions as AWS Partner

By: Greg Tavarez    9/22/2022

Fuse joined the Amazon Web Services Partner Network as a hardware provider.

Read More