Azure Intelligent Gateway
Why use the Microchip solution?
With Microchip’s Azure solution, you can provide a secure intelligent edge gateway for Azure to your customers. The ample security features leveraged by the Sequitur Labs IoT Security Suite and the SAMA5D2 MPU will keep your secrets secure and your IP, revenue and customers protected.
- Establish the intelligent edge as a root of trust
- Reduce operating cost
- Mitigate connectivity outages
- Secure connectivity
- Intellectual property protection
- Keys/certificates protection
- Secure boot/secure update
- Trusted Execution Environment (TEE)
- Docker® technology supported
Microchip has partnered with Sequitur Labs to provide an intelligent edge solution based on Microsoft Azure Certified hardware SAMA5D2 MPU. By using the SAMA5D2 Arm® Cortex-A5® microprocessor with advanced security features such as Arm TrustZone®, secure boot, secure update and hardware key storage, your customers will know that their secrets are safe.
Sequitur Labs’ CoreTEE® based Trusted Execution Environment software utilizes the SAMA5D2’s hardware security features including Arm TrustZone. This secured operating environment allows the edge gateway device to be authenticated and secured as part of the Azure cloud.
The Integrity Check Monitor oversees and protects software downloaded from the Azure cloud to containers running on the SAMA5D2. The combination of hardware and software security provided by Microchip and Sequitur Labs’ enables the deployment of secured gateways certified for the Microsoft Azure ecosystem.
Rely on Azure IoT Hub to easily and securely connect your Internet of Things (IoT) assets. Use device-to-cloud telemetry data to understand the state of your devices and assets, and be ready to act when an IoT device needs your attention.
The Azure IoT Edge runtime enables custom and cloud logic on IoT Edge devices. It sits on the IoT Edge device, and performs management and communication operations.
With the IoT Security Suite for the Microchip SAMA5D2, customers can implement security functions that are foundational to trustworthy IoT devices. These include implementing hardware-based isolation, access to hardware cryptography and implementing a hardware-based root-of-trust as well as essential key and certification management tools.