Broadcom Secures Cloud Computing with Its SoC Family

Broadcom Secures Cloud Computing with Its SoC Family

Broadcom has announced two additions to its security system-on-a-chip (SoC) family that effectively secure tablet, PC, and Cloud Computing. The global provider of semiconductor solutions for wired and wireless communications has unveiled the BCM5882 and BCM5883, and claims that they are the most highly integrated secure SoC processors in the industry.

Cloud computing technologies require repeated authentication throughout the work day and Broadcom notes that its secure SoCs can ease the use of cloud computing applications by eliminating the need for repeated log in and authentication through enterprise-class single sign-on applications. PC OEMs can leverage the new SoCs to benefit from a highly scalable and cost-effective a security solution. The new SoCs boasts a combination of near field communication (NFC) technology, a secure processor and biometric capabilities, all on one chip. This combination has the ability to isolate user authentication from the host computing system through a multi-factor, multi-choice authentication and data protection process.  Because IT managers can leverage this security platform across product families and form-factors, it allows them to have a consistent security platform throughout the organization.

The frequency and cost of data breaches continue to rise, fueling demand for more secure solutions,” said Chuck Tato, director, Connectivity, Processor & Security Solutions, Broadcom Corporation. “Our latest secure SoCs provide a flexible solution for increased security throughout enterprise and cloud networking applications. By delivering all necessary functionality on a single host-isolated device, IT managers can secure data literally at the ‘front door’ of the system.”

Broadcom notes that today businesses have to deal with increasing enterprise network security breaches and challenges associated with social media sites and data stored in the cloud.  For this reason, security experts, suppliers and service providers aim to improve network security and will benefit from Credential Vault.

Developed by Broadcom, Credential Vault feature forms the core of the SoC and ensures that user and device keys and credentials are securely stored.

By Anuradha Shukla

About CloudBuzz

Discover some of the top aggregated and curated technology news stories from around the world under the CloudBuzz authorship.

Catchup on trending stories related to Big Data, Cloud Computing, Wearable Technology, Internet of Things, Virtual Reality, Mobile Technologies and much more from some of the top information sources.

Find out more
View All Articles

Sorry, comments are closed for this post.

On-Premise VoIP vs The Cloud

On-Premise VoIP vs The Cloud

Modern Day Phone Systems The jargon in the business phone system industry is enough to make even the most tech-savvy entrepreneur’s head spin. However, if we cut through all the strange wording and focus on the features that make each system unique, we can develop enough of an understanding to make a well-informed decision for…

Cloud Email Marketing Services vs. Transactional Email Services

Cloud Email Marketing Services vs. Transactional Email Services

Cloud Based Email Marketing Services Every business can benefit from successful implementation of email marketing strategies, but the variety of SaaS on the market can be a little overwhelming at times. Whether you’re interested in learning more about email marketing or hoping to clear up any confusion surrounding transactional email, a little research into these…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Next Generation of Cyber Security As I walked through RSA last week, I was struck by the usual fear laden messages “You’re not safe and never will be but I (vendor) have a silver bullet that will protect you.” And, I wondered if this fear-based approach is deterring a badly needed next generation of cyber…

Utilizing Software Defined Networking (SDN)

Utilizing Software Defined Networking (SDN)

Software Defined Networking Winding down this year, we only have a couple of topics left: SDNs and SDI. Although SDNs are part of a solid SDI, we want to talk directly about it now. Many cloud management tools have the ability to create a virtual network. But creating a true VXLAN would require support of…

How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles
Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing In The Cloud Marketers are constantly looking for better ways to tantalize and engage customers, and there’s no space more competitive than the digital universe. Deliberating over pleasing layouts, effective calls to action, site responsiveness, and much more, digital marketers have more than enough to keep themselves busy without understanding the intricacies…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor