Broadcom Secures Cloud Computing with Its SoC Family

Broadcom Secures Cloud Computing with Its SoC Family

Broadcom has announced two additions to its security system-on-a-chip (SoC) family that effectively secure tablet, PC, and Cloud Computing. The global provider of semiconductor solutions for wired and wireless communications has unveiled the BCM5882 and BCM5883, and claims that they are the most highly integrated secure SoC processors in the industry.

Cloud computing technologies require repeated authentication throughout the work day and Broadcom notes that its secure SoCs can ease the use of cloud computing applications by eliminating the need for repeated log in and authentication through enterprise-class single sign-on applications. PC OEMs can leverage the new SoCs to benefit from a highly scalable and cost-effective a security solution. The new SoCs boasts a combination of near field communication (NFC) technology, a secure processor and biometric capabilities, all on one chip. This combination has the ability to isolate user authentication from the host computing system through a multi-factor, multi-choice authentication and data protection process.  Because IT managers can leverage this security platform across product families and form-factors, it allows them to have a consistent security platform throughout the organization.

The frequency and cost of data breaches continue to rise, fueling demand for more secure solutions,” said Chuck Tato, director, Connectivity, Processor & Security Solutions, Broadcom Corporation. “Our latest secure SoCs provide a flexible solution for increased security throughout enterprise and cloud networking applications. By delivering all necessary functionality on a single host-isolated device, IT managers can secure data literally at the ‘front door’ of the system.”

Broadcom notes that today businesses have to deal with increasing enterprise network security breaches and challenges associated with social media sites and data stored in the cloud.  For this reason, security experts, suppliers and service providers aim to improve network security and will benefit from Credential Vault.

Developed by Broadcom, Credential Vault feature forms the core of the SoC and ensures that user and device keys and credentials are securely stored.

By Anuradha Shukla

Sorry, comments are closed for this post.

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…