Understand the vendor ecosystem for secure Microcontroller Units (MCUs).
Identify the security features of secure MCUs.
Understand the key applications for secure MCUs.
Critical Questions Answered
What are the primary capabilities and features of secure MCUs?
What are the target applications for the various secure MCUs?
Which are the key companies and what are their flagship product lines?
Research Highlights
Existing product lines in the secure MCU space.
Detailed breakdown of security features, including security co-processor, secure boot, root of trust, supported encryption and hash algorithms, Random Number Generator (RNG)/True Random Number Generator (TRNG), unique ID, Non-Volatile Memory (NVM) key storage, memory protection, One-Time Programmable (OTP), tamper resistance, key generation and management, digital certificate capabilities, secure communications, standards/regulation compliance, software development platforms, lifecycle device management, and cloud enrollment.
Who Should Read This?
What are the primary capabilities and features of secure MCUs?
Which are the key companies and what are their flagship product lines?