Broadcom Secures Cloud Computing with Its SoC Family

Broadcom Secures Cloud Computing with Its SoC Family

Broadcom has announced two additions to its security system-on-a-chip (SoC) family that effectively secure tablet, PC, and Cloud Computing. The global provider of semiconductor solutions for wired and wireless communications has unveiled the BCM5882 and BCM5883, and claims that they are the most highly integrated secure SoC processors in the industry.

Cloud computing technologies require repeated authentication throughout the work day and Broadcom notes that its secure SoCs can ease the use of cloud computing applications by eliminating the need for repeated log in and authentication through enterprise-class single sign-on applications. PC OEMs can leverage the new SoCs to benefit from a highly scalable and cost-effective a security solution. The new SoCs boasts a combination of near field communication (NFC) technology, a secure processor and biometric capabilities, all on one chip. This combination has the ability to isolate user authentication from the host computing system through a multi-factor, multi-choice authentication and data protection process.  Because IT managers can leverage this security platform across product families and form-factors, it allows them to have a consistent security platform throughout the organization.

The frequency and cost of data breaches continue to rise, fueling demand for more secure solutions,” said Chuck Tato, director, Connectivity, Processor & Security Solutions, Broadcom Corporation. “Our latest secure SoCs provide a flexible solution for increased security throughout enterprise and cloud networking applications. By delivering all necessary functionality on a single host-isolated device, IT managers can secure data literally at the ‘front door’ of the system.”

Broadcom notes that today businesses have to deal with increasing enterprise network security breaches and challenges associated with social media sites and data stored in the cloud.  For this reason, security experts, suppliers and service providers aim to improve network security and will benefit from Credential Vault.

Developed by Broadcom, Credential Vault feature forms the core of the SoC and ensures that user and device keys and credentials are securely stored.

By Anuradha Shukla

About CloudBuzz

Discover some of the top aggregated and curated technology news stories from around the world under the CloudBuzz authorship.

Catchup on trending stories related to Big Data, Cloud Computing, Wearable Technology, Internet of Things, Virtual Reality, Mobile Technologies and much more from some of the top information sources.

Find out more
View All Articles

Sorry, comments are closed for this post.

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

E-Commerce Advances For Savvy Marketers

E-Commerce Advances For Savvy Marketers

Digital Marketing Platforms Advertising and marketing techniques have progressed rapidly in the last decade with both channel focus and the direction of content shifting considerably due primarily to advances in cloud technology. Gartner’s Magic Quadrant for Digital Commerce 2016 singles out a few ecommerce providers who are topping their sector in both ability to execute…

The Lighter Side Of The Cloud – Energy Battle

The Lighter Side Of The Cloud – Energy Battle

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via@cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Cloud Comings and Goings

Cloud Comings and Goings

Cloud Power Amazon Web Services – the giant of cloud computing – is on track to do $10 Billion in revenue this year. Yet, rumors swirl that Apple may take a huge chunk of business away from them and Dropbox has definitely left AWS. Is something wrong at AWS? Wait, Salesforce.com (SFDC) – the granddaddy of…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford to focus on anything…

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design For all you non-techies… You’re probably wondering what big data is (I know I was….a few years back) so let’s get the definitions out of the way so we’re on the same page, okay? Big data is A LOT of data – really, it is. It is a…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…