Security for the Next One Trillion Devices

Arm-based chips are already in more than 100 billion devices, and as the Internet of Things (IoT) rapidly expands, we expect that number to grow to a global network of one trillion connected devices. Security cannot be an afterthought. It must considered at inception, and each threat addressed with the appropriate countermeasure. Arm has been helping the ecosystem secure devices from chip to cloud for many years, and remains committed to an end-to-end approach to security.

Features and Benefits
Vast Ecosystem

More than 1,600 software, tools and service partners to support and enable the use of our technology.

Standard Industry Framework

The Arm Platform Security Architecture (PSA) is the framework for a common security best practice.

Protection Against a Broad Spectrum of Attacks

Our IP extends across the system with protection for processors, subsystems, acceleration, and offloading—all fitting together seamlessly for layered protection.

Continued Investment

Arm continues to build on its history in mobile security, addressing new market requirements for developer-friendly, deterministic, real-time embedded and IoT applications.

Global Reach, Global Ecosystem

Arm is at the epicenter of the world’s largest compute ecosystem. We are uniquely positioned to take a?system-wide approach ?to security, applying the insights gained from over 100 billion Arm-based chips, and working with our partners to generate more trusted intelligent-learning capabilities on more devices at the edge. Our Platform Security Architecture (PSA), rallies the industry to adopt a common framework, shifting the economics of designing-in scalable security for connected devices.

Easy Access to Built-In Security

The true value of connecting a trillion devices lies in the seamless flow of trusted data between devices and from device to cloud. Security must remain invisible, yet always present, and never interfere with legitimate data flow. By embedding security in our architecture, designs, frameworks and products, and promoting industry standards through the PSA, we’re reducing friction and time-to-security across the design and development cycle.

Architects of a Secure Connected World

Arm has a strong history in security originating from our heritage of providing secure compute platforms for the mobile revolution. Arm technology has been used to secure smartcards, SIMs and other secure elements through to feature-rich secured devices in mobile handsets, tablet computers, DTVs, set top boxes and enterprise systems. We continue to build on that history, applying our expertise to new market requirements, including developer-friendly, deterministic, real-time embedded and IoT applications.


Infographic: 6 Steps to Develop Secure and Connected IoT Devices

Solutions Ensuring Security from Chip to Cloud

As security attacks and threats continue to evolve, so must the methods to combat them. Arm provides an expanding portfolio of secure IP, firmware and software, collaborating with the ecosystem to provide the right counter-measures for the variety of threats now facing devices. Solutions include Arm TrustZone technology for Cortex-A and Cortex M processors, plus a range of Arm TrustZone-enabled CPUs. Also device management solutions, such as? Arm Device Management and a wide suite of security IP, which includes a new set of products to protect against physical attacks. Arm?Mbed OS, an open source embedded operating system delivers security throughout the device lifecycle.

Talk with an Expert

 As long as there is value in controlling a device or accessing its data, there will be a constant battle against potential attackers. Talk with an Arm expert to learn more about security technologies that can be designed into devices.

Contact Us
Arm Security Survey

We asked 1,200 tech sector workers what
they thought about security

Sixty-seven percent (67%) thought most technology companies
did not regard security as fundamental. Arm believes this is a problem.

See other survey results

Protect Your Data Platforms from the Next Wave of Cybercrime

The latest Arm Security Manifesto 2018 shows a disturbing trend in the continuing rise of cybercrime, particularly vast armies of attack bots and elaborate global security offensives. Yet industry is under pressure to simplify IoT, even as the numbers of IoT devices and data streams multiply by billions every year.

Download 2018 Manifesto