We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest. Update Here
Stay in the loop with the latest from Microchip. Update your profile while you are at it. Update Here
Complete your profile to access more resources. Update Here

Platform Root of Trust

Establish System Trust Chain With Our Platform Root of Trust Controllers


As cybersecurity threats continue to evolve, platforms must adapt rapidly to defend against attacks during start-up, real-time operation and system updates. Securing your systems starts with ensuring that the hardware and firmware are resilient against potential threats.

Our platform and component Root of Trust (RoT) controllers provide robust cyber resiliency for equipment that exceeds the NIST 800-193 Platform Firmware Resiliency (PFR) guidelines. These controllers deliver runtime firmware protection, anchor the secure boot process and establish a comprehensive chain of trust for platform security. With built-in device and firmware attestation, our solutions provide verifiable proof of authenticity. The advanced FIPS Cryptographic Algorithm Validation Program (CAVP) hardware cryptography engine allows only trusted firmware to be executed, which protects systems from malicious code.

Our portfolio of platform RoT products is designed for data centers, storage, telecommunications, networking, industrial and automotive applications and delivers the security and reliability needed to safeguard modern infrastructure.

TrustFLEX for CEC173x Devices


The CEC1736-TFLX is a real-time platform root of trust device that is partially configured to support most hardware root of trust use cases in data centers, industrial, telecommunications and other applications. The easy-to-use Trust Platform Design Suite (TPDS) provides a GUI-based platform to configure the device for specific use cases and generate a provisioning package to trigger our secure provisioning service. 

Post-Quantum Cryptography


The goal of our post-quantum cryptography solutions is to safeguard embedded systems against future quantum threats by providing hardware with algorithms that enable secure, long-term protection without requiring deep expertise in quantum security.

Live Chat

Need Help?

Privacy Policy