Making security ubiquitous and easily accessible to the masses
while also fostering trust in cyber systems is the main vision
Securing cyber systems and electronic communication channels using
innovative security techniques to prevent leaking of critical data.
Through the use of hardware enabled Root of Trust and powerful
Secure Execution Environments, sensitive data and cryptographic
materials are kept protected against data and Intellectual
Property (IP) theft and untrusted code execution.
Through innovation, the once costly and inaccessible technologies
and methods to enable Secure Execution, hardware Root of Trust,
protection of IP and securing of critical data, systems and
infrastructures are brought to the masses on an individual and group
scale while seeking to keep the cost down and increasing the acceptance
and usability of these technologies.