More Secure, Less Costly IoT Edge Node Security Provisioning
|
|
|
- Abigail Wade
- 9 years ago
- Views:
Transcription
1 More Secure, Less Costly IoT Edge Node Security Provisioning Authors: Nicolas Schieli, Sr. Director, Secure Products Group Ron Ih, Sr. Manager, Marketing and Business Development Eustace Asanghanwa, Manager, Business Development Imagine that you ve purchased a fancy new connected home thermostat from some well-known company like Home Depot. It can communicate with the Cloud specifically, a network that Home Depot has built. But mostly, it s just a thermostat, a simple edge node device on a cloud-based system. Why would you need security in a thermostat? No one can get into your bank account with it; no one can spy on your children s phones with it; it s just a thermostat that happens to be able to phone home. That is, until someone hacks through your thermostat into Home Depot s network where they can then help themselves to credit card numbers and other tempting pieces of information that they re not supposed to be able to reach.
2 And this isn t a hypothetical scenario: it actually happened. * Now put yourself in Home Depot s position after being burned by the hacker. Let s say you re approached by someone with an even niftier thermostat, and they d like to partner up with you so that you ll sell their unit and connect it to your Cloud facility. You may be interested in working with them until they get to the part where they tell you that they didn t build in security, because, after all, it s just a thermostat; what could possibly go wrong? You know exactly what can go wrong, because you have the scars to prove it. You pass on the deal, and the thermostat maker learns the hard way that, without security, they saved some cost, but they may not sell many units. This makes edge nodes the most vulnerable points in the Internet of Things (IoT). It s too easy to think of them as isolated embedded systems of no value to a hacker. And, especially in the home market, cost is important, so every little opportunity to save is welcome. But omitting security is not an option; all edge nodes just like any other node on the network must be secure. Two-Step Security There are many components to security, but they all involve the exchange of certificates and other trusted artifacts that have an established chain of trust and rely on a unique device private key (from which a public key is derived). Implementing a security strategy on an edge node involves two separate steps: provisioning and commissioning. Provisioning takes a raw device and gives it an identity for security purposes. This involves loading a unique private key and any other certificates or artifacts necessary for eventual use. Provisioning establishes the device as legitimate and trustworthy. The trust inherent in a well-provisioned device originates with a root of trust backing up all other trusted entities in a chain of trust. The root can be generated by anyone what s important is that it be, by definition, trusted unquestioningly. So buyers and network managers would need to understand who that root is in order for the trust to be credible. A large, well-known company with an established reputation at stake can probably make its own root. A small start-up or maker organization, by contrast, probably cannot. It s not because the smaller company is * WSJ article: 2
3 any less trustworthy; it s simply because they re not well known, they must find someone else to vouch for them. This is where Certificate Authorities (CAs) like Verisign fit in; they are in the business of being trusted and of vouching for other companies. So, while a large company might sign its own keys, small companies are likely to have keys signed by a CA. Provisioning prepares a device for use, but it leaves the device in a generic state. Commissioning (or on-boarding or taking ownership ) is the second security step, performed after the device is purchased. It s the act of letting the pre-provisioned device join a network, and it usually involves an account with the network provider and validation steps like passwords delivered by cell phone. It transforms the device from generic to one associated with a specific user on a specific network. Provisioning is done during the device (or component) manufacturing or testing process; commissioning is managed by the network provider and end user. Successful commissioning relies on proper provisioning, but traditional provisioning techniques incur significant costs and leave security holes. A new approach to provisioning is emerging that provides better security at lower cost. The Provisioning Problem A signed key is the minimal requirement for provisioning a device. This key will eventually need to be recognized and accepted by a network during commissioning. Provisioning is done with the assistance of a hardware secure module (HSM) that protects the loading of keys in an auditable process. Not just any key will do when provisioning. If that were the case, then manufacturers could easily make more devices than ordered (so-called over-building ) and sell the excess on the gray market. In order to thwart this, the manufacturing process must account for all of the keys assigned. The network that will accept a device must be sure that the device is legitimate, so the network must know which keys were assigned during manufacturing. Only those keys will be allowed to join the network. This means that a database of keys must be maintained. The database is built when devices are manufactured, and is used by the network operator to validate keys when they re commissioned. Maintaining and managing this database is cumbersome and adds cost, but, worse yet, it becomes a single point of attack for the network. If someone can hack into the database, then all of the keys are compromised. 3
4 Figure 1. Traditionally, devices or systems are provisioned either on high-volume testers or low-volume HSMs. Keys are recorded in a database that the network consults during commissioning. While this process prevents outright over-building, it doesn t prevent cloning. In the case of cloning, more than one device is built with the same key. One is sold on the legitimate market; the clones are sold on the gray market. Small companies need to turn to CAs for signed keys, and those CAs charge for each key. That adds to the bill of materials of each device manufactured. And, while large companies can amortize HSM costs over large quantities of devices or systems, those costs can be substantial for smaller companies provisioning modest numbers of devices. Finally, if the keys are stored in Flash memory in the edge node device, it becomes possible for a determined hacker to find and decrypt the key. While not a result of the provisioning process per se, it adds to the downsides of the way provisioning has traditionally been done. Cheaper Provisioning for Better Security An alternative approach to provisioning is now available, based on newer chips whose sole purpose is to act as a trusted guardian of keys, certificates, and other security secrets. Such a chip will be provisioned with a private key (ideally, generating the key internally), but that key will never be divulged by the chip. 4
5 Instead, when a key is needed, the device will generate a public key, or any other secure artifact, derived from, but not the same as, the private key. Primarily, this prevents cloning. The key in they type of system is controlled by a single, separate chip not other commodity chips such as Flash memory. If 1000 systems are to be built, then exactly 1000 units of the security chip can be provided, leaving no extras for cloned versions. These devices permit storage of other security elements like certificates. And they may provide key and certificate generation and storage as well as authentication support in an opaque manner, thereby offloading the system processor. The Trusted Platform Module (TPM) is one well-known example of hardware designed to support these security functions. But devices based on the TPM typically can t meet the cost expectations of low-cost IoT edge nodes. A lower-cost example is the Atmel CryptoAuthentication ATECC508A. As with Atmel TPM devices, this device creates its own private key internally when triggered during provisioning. That private key can never be read by anyone making cloning completely impossible. It also eliminates the need for a database, saving time and effort as well as taking away a single point of attack for the network. At higher volumes, Atmel can pre-provision devices during testing as a service. Alternatively, a system manufacturer can do the provisioning using its tester. For lower volumes, Atmel provides a toolkit that allows system design houses to provision prototypes and first-run devices in-house. This saves the cost of investing in an HSM. The toolkit provides the option of either self-signing or acquiring a single CA certificate to use as the basis for the chain of trust for each device, making it unnecessary to buy a separate CA certificate for each device. 5
6 Figure 2. Devices in large quantities can be pre- provisioned by a device maker like Atmel or by an authorized assembly house during system test. Low quantities can be provisioned using an Atmel toolkit without an HSM investment. Using a dedicated security chip can help close security holes and reduce provisioning cost. Security is improved by eliminating cloning and removing the key database as a hacking target. Costs are reduced by eliminating the need to maintain a key database and getting rid of per-unit key charges. This combination of higher security and lower cost will make it more attractive and affordable to add security to IoT edge nodes. Given the increased scrutiny of edge nodes especially by network managers, such security will be mandatory for any edge node to achieve significant sales and for the IoT to build out as promised. 6
7 Atmel Corporation 1600 Technology Drive, San Jose, CA USA T: (+1)(408) F: (+1)(408) Atmel Corporation. / Rev.: Atmel A-Security-Provisioning-Article_US_ Atmel, Atmel logo and combinations thereof, Enabling Unlimited Possibilities, and others are registered trademarks or trademarks of Atmel Corporation or its subsidiaries. ARM, ARM Connected logo and others are the registered trademarks or trademarks of ARM Ltd. Other terms and product names may be the trademarks of others. Disclaimer: The information in this document is provided in connection with Atmel products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Atmel products. EXCEPT AS SET FORTH IN THE ATMEL TERMS AND CONDITIONS OF SALES LOCATED ON THE ATMEL WEBSITE, ATMEL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL ATMEL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS AND PROFITS, BUSINESS INTERRUPTION, OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF ATMEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Atmel makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and products descriptions at any time without notice. Atmel does not make any commitment to update the information contained herein. Unless specifically provided otherwise, Atmel products are not suitable for, and shall not be used in, automotive applications. Atmel products are not intended, authorized, or warranted for use as components in applications intended to support or sustain life. 7
Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview
Application Note Atmel CryptoAuthentication Product Uses Atmel Abstract Companies are continuously searching for ways to protect property using various security implementations; however, the cost of security
APPLICATION NOTE. Secure Personalization with Transport Key Authentication. ATSHA204A, ATECC108A, and ATECC508A. Introduction.
APPLICATION NOTE Secure Personalization with Transport Key Authentication ATSHA204A, ATECC108A, and ATECC508A Introduction The Atmel CryptoAuthentication ATSHA204A, ATECC108A, and ATECC508A devices (crypto
APPLICATION NOTE. Authentication Counting. Atmel CryptoAuthentication. Features. Introduction
APPLICATION NOTE Authentication Counting Atmel CryptoAuthentication Features How to achieve high endurance counters in excess of 800,000 counts. How to disable the Atmel CryptoAuthentication ATSHA204A
Application Note. Atmel ATSHA204 Authentication Modes. Prerequisites. Overview. Introduction
Application Note Atmel Authentication Modes Prerequisites Hardware Atmel AT88CK454BLACK Evaluation Board Atmel AT88CK109STK8 Kit Software Atmel Crypto Evaluation Studio (ACES) Overview Understand which
SMARTCARD XPRO. Preface. SMART ARM-based Microcontrollers USER GUIDE
SMART ARM-based Microcontrollers SMARTCARD XPRO USER GUIDE Preface Atmel SMARTCARD Xplained Pro is an extension board to the Atmel Xplained Pro evaluation platform. Atmel SMARTCARD Xplained Pro is designed
CryptoAuth Xplained Pro
CryptoAuth Xplained Pro CryptoAuthentication Xplained Pro Extension Board HARDWARE USER GUIDE Atmel CryptoAuth Xplained Pro Extension Board Introduction The Atmel CryptoAuth Xplained Pro (CAXPro) Evaluation
Designing Feature-Rich User Interfaces for Home and Industrial Controllers
Designing Feature-Rich User Interfaces for Home and Industrial Controllers Author: Frédéric Gaillard, Product Marketing Manager, Atmel We have all become familiar with intuitive user interfaces on our
AT88CK490 Evaluation Kit
AT88CK490 Evaluation Kit CryptoAuthentication USB Dongle HARDWARE USER GUIDE Atmel AT88CK490 CryptoAuthentication Evaluation Kit Introduction The Atmel AT88CK490 CryptoAuthentication Evaluation Kit is
APPLICATION NOTE. AT16268: JD Smart Cloud Based Smart Plug Getting. Started Guide ATSAMW25. Introduction. Features
APPLICATION NOTE AT16268: JD Smart Cloud Based Smart Plug Getting Started Guide ATSAMW25 Introduction This application note aims to help readers to get started with the Atmel smart plug reference design
Atmel AVR4921: ASF - USB Device Stack Differences between ASF V1 and V2. 8-bit Atmel Microcontrollers. Application Note. Features.
Atmel AVR4921: ASF - USB Device Stack Differences between ASF V1 and V2 Features Advantages Implementation differences Integration Migration from stack V1 to stack V2 8-bit Atmel Microcontrollers Application
How To Use An Atmel Atmel Avr32848 Demo For Android (32Bit) With A Microcontroller (32B) And An Android Accessory (32D) On A Microcontroller (32Gb) On An Android Phone Or
APPLICATION NOTE Atmel AVR32848: Android Accessory Demo 32-bit Atmel Microcontrollers Features Control an accessory from an Android device Send data to and from an Android device to an accessory Supported
USER GUIDE EDBG. Description
USER GUIDE EDBG Description The Atmel Embedded Debugger (EDBG) is an onboard debugger for integration into development kits with Atmel MCUs. In addition to programming and debugging support through Atmel
AVR1900: Getting started with ATxmega128A1 on STK600. 8-bit Microcontrollers. Application Note. 1 Introduction
AVR1900: Getting started with ATxmega128A1 on STK600 1 Introduction This document contains information about how to get started with the ATxmega128A1 on STK 600. The first three sections contain information
APPLICATION NOTE. Atmel AT04389: Connecting SAMD20E to the AT86RF233 Transceiver. Atmel SAMD20. Description. Features
APPLICATION NOTE Atmel AT04389: Connecting SAMD20E to the AT86RF233 Transceiver Description Atmel SAMD20 This application note describes a method to connect an Atmel ATSAMD20E microcontroller to an Atmel
AVR115: Data Logging with Atmel File System on ATmega32U4. Microcontrollers. Application Note. 1 Introduction. Atmel
AVR115: Data Logging with Atmel File System on ATmega32U4 Microcontrollers 01101010 11010101 01010111 10010101 Application Note 1 Introduction Atmel provides a File System management for AT90USBx and ATmegaxxUx
AVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR1318: Using the XMEGA built-in AES accelerator Features Full compliance with AES (FIPS Publication 197, 2002) - Both encryption and decryption procedures 128-bit Key and State memory XOR load option
AVR32701: AVR32AP7 USB Performance. 32-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR32701: AVR32AP7 USB Performance Features Linux USB bulk transfer performance ATSTK1000 (32-bit SDRAM bus width) ATNGW100 (16-bit SDRAM bus width) GadgetFS driver and gadgetfs-test application USB performance
APPLICATION NOTE. AT07175: SAM-BA Bootloader for SAM D21. Atmel SAM D21. Introduction. Features
APPLICATION NOTE AT07175: SAM-BA Bootloader for SAM D21 Atmel SAM D21 Introduction Atmel SAM Boot Assistant (Atmel SAM-BA ) allows In-System Programming (ISP) from USB or UART host without any external
AVR151: Setup and Use of the SPI. Introduction. Features. Atmel AVR 8-bit Microcontroller APPLICATION NOTE
Atmel AVR 8-bit Microcontroller AVR151: Setup and Use of the SPI APPLICATION NOTE Introduction This application note describes how to set up and use the on-chip Serial Peripheral Interface (SPI) of the
AVR1309: Using the XMEGA SPI. 8-bit Microcontrollers. Application Note. Features. 1 Introduction SCK MOSI MISO SS
AVR1309: Using the XMEGA SPI Features Introduction to SPI and the XMEGA SPI module Setup and use of the XMEGA SPI module Implementation of module drivers Polled master Interrupt controlled master Polled
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
USER GUIDE. ZigBit USB Stick User Guide. Introduction
USER GUIDE ZigBit USB Stick User Guide Introduction This user guide describes how to get started with the Atmel ZigBit USB sticks. The ZigBit USB sticks is targeted for evaluating the USB features of the
32-bit AVR UC3 Microcontrollers. 32-bit AtmelAVR Application Note. AVR32769: How to Compile the standalone AVR32 Software Framework in AVR32 Studio V2
AVR32769: How to Compile the standalone AVR32 Software Framework in AVR32 Studio V2 1. Introduction The purpose of this application note is to show how to compile any of the application and driver examples
AVR1922: Xplain Board Controller Firmware. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR1922: Xplain Board Controller Firmware Features USB interface - Mass-storage to on-board DataFlash memory Atmel AVR XMEGA TM reset control 1 Introduction The Xplain board controller, an AT90USB1287,
Partners in Care Welch Allyn Connex Software Development Kit License Agreement
This Software Development Kit End User ( Agreement ) is between Welch Allyn, Inc. ( Welch Allyn ) and the Customer identified in the purchase order ( Customer or You ), and it governs the Software Development
Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
AVR353: Voltage Reference Calibration and Voltage ADC Usage. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR353: Voltage Reference Calibration and Voltage ADC Usage Features Voltage reference calibration. - 1.100V +/-1mV (typical) and < 90ppm/ C drift from 10 C to +70 C. Interrupt controlled voltage ADC sampling.
Atmel AVR4903: ASF - USB Device HID Mouse Application. Atmel Microcontrollers. Application Note. Features. 1 Introduction
Atmel AVR4903: ASF - USB Device HID Mouse Application Features USB 2.0 compliance - Chapter 9 compliance - HID compliance - Low-speed (1.5Mb/s) and full-speed (12Mb/s) data rates Standard USB HID mouse
Introduction to Version Control in
Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any
8-bit. Application Note. Microcontrollers. AVR282: USB Firmware Upgrade for AT90USB
AVR282: USB Firmware Upgrade for AT90USB Features Supported by Atmel FLIP program on all Microsoft O/S from Windows 98SE and later FLIP 3.2.1 or greater supports Linux Default on chip USB bootloader In-System
Quest vworkspace Virtual Desktop Extensions for Linux
Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.
Capacitive Touch Technology Opens the Door to a New Generation of Automotive User Interfaces
Capacitive Touch Technology Opens the Door to a New Generation of Automotive User Interfaces Stephan Thaler, Thomas Wenzel When designing a modern car, the spotlight is on the driving experience, from
Simplify Your Migrations and Upgrades. Part 1: Avoiding risk, downtime and long hours
Simplify Your Migrations and Upgrades Part 1: Avoiding risk, downtime and long hours Introduction You can say migrations and upgrades to a database administrator (DBA) or systems administrator. But what
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,
APPLICATION NOTE. Atmel AVR134: Real Time Clock (RTC) Using the Asynchronous Timer. Atmel AVR 8-bit Microcontroller. Introduction.
APPLICATION NOTE Atmel AVR134: Real Time Clock (RTC) Using the Asynchronous Timer Introduction Atmel AVR 8-bit Microcontroller This application note describes how to implement a real time counter (RTC)
Atmel AVR4920: ASF - USB Device Stack - Compliance and Performance Figures. Atmel Microcontrollers. Application Note. Features.
Atmel AVR4920: ASF - USB Device Stack - Compliance and Performance Figures Features Compliance to USB 2.0 - Chapters 8 and 9 - Classes: HID, MSC, CDC, PHDC Interoperability: OS, classes, self- and bus-powered
APPLICATION NOTE. AT12405: Low Power Sensor Design with PTC. Atmel MCU Integrated Touch. Introduction
APPLICATION NOTE AT12405: Low Power Sensor Design with PTC Atmel MCU Integrated Touch Introduction A ma saved (reduced) is a mah gained the philosophical engineer The challenges for improving battery life
Using CryptoMemory in Full I 2 C Compliant Mode. Using CryptoMemory in Full I 2 C Compliant Mode AT88SC0104CA AT88SC0204CA AT88SC0404CA AT88SC0808CA
Using CryptoMemory in Full I 2 C Compliant Mode 1. Introduction This application note describes how to communicate with CryptoMemory devices in full I 2 C compliant mode. Full I 2 C compliance permits
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
SharePlex for SQL Server
SharePlex for SQL Server Improving analytics and reporting with near real-time data replication Written by Susan Wong, principal solutions architect, Dell Software Abstract Many organizations today rely
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
Active Directory Auditing: What It Is, and What It Isn t
Active Directory Auditing: What It Is, and What It Isn t Abstract What s wrong with Active Directory s native audit logging? More importantly, what functionality do you really need in an AD auditing solution,
AVR32138: How to optimize the ADC usage on AT32UC3A0/1, AT32UC3A3 and AT32UC3B0/1 series. 32-bit Microcontrollers. Application Note.
AVR32138: How to optimize the ADC usage on AT32UC3A0/1, AT32UC3A3 and AT32UC3B0/1 series 1 Introduction This application note outlines the steps necessary to optimize analog to digital conversions on AT32UC3A0/1,
Dell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant [email protected] Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
Object Level Authentication
Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required
ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Application Note. 8-bit Microcontrollers. AVR270: USB Mouse Demonstration
AVR270: USB Mouse Demonstration Features Runs with AT90USB Microcontrollers at 8MHz USB Low Power Bus Powered Device (less then 100mA) Supported by any PC running Windows (98SE or later), Linux or Mac
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
AVR1510: Xplain training - XMEGA USART. 8-bit Microcontrollers. Application Note. Prerequisites. 1 Introduction
AVR1510: Xplain training - XMEGA USART Prerequisites Required knowledge AVR1500: Xplain training XMEGA Basics AVR1502: Xplain training XMEGA Direct Memory Access Controller Software prerequisites Atmel
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
Navigating the NIST Cybersecurity Framework
Navigating the NIST Cybersecurity Framework Explore the NIST Cybersecurity Framework and tools and processes needed for successful implementation. Abstract For federal agencies, addressing cybersecurity
Solving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
AT91SAM ARM-based Flash MCU. Application Note
Modbus Slave Stack for the Atmel Family of SAM3 Microcontrollers (Free Modbus Stack from Embedded Solutions) 1. Scope This application note provides directions and instructions to application engineers
Logging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
APPLICATION NOTE. Atmel LF-RFID Kits Overview. Atmel LF-RFID Kit. LF-RFID Kit Introduction
APPLICATION NOTE Atmel LF-RFID Kits Overview Atmel LF-RFID Kit LF-RFID Kit Introduction Atmel offers several design and evaluation kits for a fast and easy way to test the LF-RFID technology but also developing
AT11805: Capacitive Touch Long Slider Design with PTC. Introduction. Features. Touch Solutions APPLICATION NOTE
Touch Solutions AT11805: Capacitive Touch Long Slider Design with PTC APPLICATION NOTE Introduction Slider is a one-dimensional sensor that detects the linear movement of a finger during touch. Sliders
How to Deploy Models using Statistica SVB Nodes
How to Deploy Models using Statistica SVB Nodes Abstract Dell Statistica is an analytics software package that offers data preparation, statistics, data mining and predictive analytics, machine learning,
Security Analytics Engine 1.0. Help Desk User Guide
2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
AVR1600: Using the XMEGA Quadrature Decoder. 8-bit Microcontrollers. Application Note. Features. 1 Introduction. Sensors
AVR1600: Using the XMEGA Quadrature Decoder Features Quadrature Decoders 16-bit angular resolution Rotation speed and acceleration 1 Introduction Quadrature encoders are used to determine the position
Proactive Performance Management for Enterprise Databases
Proactive Performance Management for Enterprise Databases Abstract DBAs today need to do more than react to performance issues; they must be proactive in their database management activities. Proactive
ChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
How To Design An Ism Band Antenna For 915Mhz/2.4Ghz Ism Bands On A Pbbb (Bcm) Board
APPLICATION NOTE Features AT09567: ISM Band PCB Antenna Reference Design Atmel Wireless Compact PCB antennas for 915MHz and 2.4GHz ISM bands Easy to integrate Altium design files and gerber files Return
Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
AVR287: USB Host HID and Mass Storage Demonstration. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR287: USB Host HID and Mass Storage Demonstration Features Based on AVR USB OTG Reduced Host Runs on AT90USB647/1287 Support bootable/non-bootable standard USB mouse Support USB Hub feature (Mass Storage
EMBARCADERO ONLINE PRODUCT CERTIFICATION AGREEMENT
EMBARCADERO ONLINE PRODUCT CERTIFICATION AGREEMENT PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY. BY ACCESSING THE EMBARCADERO ONLINE CERTIFICATION WEBSITE OR BY ACCESSING OR USING THE EXAM CONTENT,
Why Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Document Version:2.0-12/07/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be
Top 10 Most Popular Reports in Enterprise Reporter
Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software
Atmel Power Line Communications. Solutions for the Smart Grid
Atmel Power Line Communications Solutions for the Smart Grid Key Applications Powering the Smart Grid Home and industrial automation Control systems Smart metering Intelligent lighting Smart appliances
AVR106: C Functions for Reading and Writing to Flash Memory. Introduction. Features. AVR 8-bit Microcontrollers APPLICATION NOTE
AVR 8-bit Microcontrollers AVR106: C Functions for Reading and Writing to Flash Memory APPLICATION NOTE Introduction The Atmel AVR devices have a feature called Self programming Program memory. This feature
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
RFRB0413 RF Ranging Base (Preliminary)
RFRB013 RF Ranging Base (Preliminary) Features High-accuracy RF ranging capabilities Line-of-sight accuracy as low as ± cm Non-line-of-sight accuracy as low as ±10 cm + meters outdoors range 30+ meters
Organized, Hybridized Network Monitoring
Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically
INTELLECTUAL PROPERTY ASSIGNMENT & GUIDELINES
& GUIDELINES Included: Overview Dos and Don ts Checklist Intellectual Property Assignment Instructions Sample Intellectual Property Assignment 1. Overview A company s ability to buy and sell property is
Terms & Conditions. Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com).
Terms & Conditions Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com). Your use of this website and Content as defined below constitutes your acceptance
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
AVR033: Getting Started with the CodeVisionAVR C Compiler. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR033: Getting Started with the CodeVisionAVR C Compiler Features Installing and Configuring CodeVisionAVR to Work with the Atmel STK 500 Starter Kit and AVR Studio Debugger Creating a New Project Using
AVR2006: Design and characterization of the Radio Controller Board's 2.4GHz PCB Antenna. Application Note. Features.
AVR26: Design and characterization of the Radio Controller Board's 2.4GHz PCB Antenna Features Radiation pattern Impedance measurements WIPL design files NEC model Application Note 1 Introduction This
CLOUD SECURITY: Secure Your Infrastructure
CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED
Go beyond basic up/down monitoring
Go beyond basic up/down monitoring Extending the value of SCOM with Foglight for SQL Server Introduction Microsoft Systems Center Operations Manager (SCOM) allows IT professionals to manage and monitor
Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated
Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary
ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT
ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT THIS SOFTWARE END USER LICENSE AGREEMENT (THIS AGREEMENT ) IS DATED FOR REFERENCE PURPOSES ONLY AS OF MARCH 26, 2009, AND IS BY AND BETWEEN ALL WEATHER,
MODEL WARRANTY BILL OF SALE & GUIDELINES
Included: Overview Dos and Don ts Checklist Warranty Bill of Sale Instructions Sample Warranty Bill of Sale 1. Overview A company s ability to sell and purchase property is essential to its long-term life
Best Practices for Secure Mobile Access
Best Practices for Secure Mobile Access A guide to the future. Abstract Today, more people are working from more locations using more devices than ever before. Organizations are eager to reap the benefits
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.
ENGLISH APPLE INC. SOFTWARE LICENSE AGREEMENT FOR APPLE STORE APPLICATION PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE USING THE APPLE SOFTWARE. BY USING THE APPLE SOFTWARE,
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Covered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
Dell One Identity Manager Scalability and Performance
Dell One Identity Manager Scalability and Performance Scale up and out to ensure simple, effective governance for users. Abstract For years, organizations have had to be able to support user communities
How To Protect Your Active Directory (Ad) From A Security Breach
Securing Active Directory: An Ounce of Prevention or a Pound of Cure? Abstract This technical brief reviews three tasks that should be a part of your proactive Active Directory (AD) security routine: Establishing
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING
