Tag: hardware root of trust

Protecting routers from ‘the perfect storm’

As routers become more advanced and take a greater role in delivering advanced services, they also become an even more attractive target for bad actors. There should be few things that scare broadband service providers more than their router population becoming infected with persistent malware.
In this blog, we will cover the importance for ISPs to have a trusted and unclonable identity into each CPE in order to safeguard the integrity of their own network and services. Plus we will answer how ISPs can ensure that its CPE suppliers build the right security foundation into the CPE and that their CPE always runs the intended software, and any malicious modification is detected and efficiently remediated.

Read More

Maintaining control in an unmanaged world

New content protection requirements around premium content are upping the ante for delivery to unmanaged devices. Many of these requirements we’ve come to expect in managed devices, but with the emergence of OTT services the requirements have softened to accommodate the app on CE device consumption model.

Ultimately many of these security components including hardware root of trust or hardware decode pipeline exist on most CE devices.

Read More
Loading