Security starter kits enable build and delivery of secure connected devices

18-12-2020 | Arrow | Subs & Systems

Arrow Electronics has released a Security Starter Kit suite that incorporates various wireless solutions and SBCs with the OPTIGA TPM2.0 and OPTIGA Trust M security solutions from Infineon Technologies.

The kit offers companies striving to add security to their end products with a straightforward security implementation path with Root of Trust abilities. To connect to cloud services is made easier with AWS IoT Greengrass and AWS IoT Core integrations.

“Over the past five years, we’ve seen an exponential growth in connected devices that sense, monitor and control things from smart home/building solutions to manufacturing equipment and everything in between, yet it is conservatively estimated that 70% of these devices have little or no security implemented in them,” said Arrow Electronics’ vice president of IoT global solutions Aiden Mitchell. “Arrow’s Security Starter Kit provides customers with ready-to-use examples that take the guesswork out of implementing the most vital security features in their end node and gateway products.”

“Customers seek simplicity when it comes to securing their IoT devices and infrastructure. End-to-end security is key. Partnering with Arrow allowed Infineon to offer customers this simplicity in the form of an easy-to-use reference solution based on our OPTIGA security chip family,” said Juergen Rebel, senior vice president and general manager Embedded Security at Infineon Technologies. “The end-to-end solution supports all cloud architectures and provides versatility at the endpoint and in edge compute environments.”


“With the boom in connected devices and associated hacking/cloning threats, security is a real concern and a de-facto feature that customers are looking for when it comes to selecting a technology platform,” said Hakim Jaafar, STM32 wireless marketing director, STMicroelectronics. “To speed up product development, all STM32 wireless products come with a secure HW IP and offer services like anti-hacking and anti-cloning, which frees customers to focus on their core application development.”

By Natasha Shek