We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X

Data Center Trusted Platform Support


With the explosion of data being created and consumed in the world today, the data center has become the target of individual, corporate and even government-sponsored attacks to compromise, steal and exploit personal, financial, medica, military data and secrets and other important information.  A compromised company’s brand, revenue, IP and customers are at stake. Depending on the severity and financial impact of a security breach, the company itself may be at stake. 

Explore how our security solutions can provide Trusted Platform support to help you mitigate and eliminate the risks associated with security vulnerabilities.

Data Center Trusted Platform Solutions


We integrate several security features in our products that are designed to protect the boot process by preventing any malware from loading during system startup. Our products use strong cryptographic support including secure key management techniques for lasting protection. These features provide security measures—absent in traditional ASICs and SoCs—that ensure only trusted software components are used during the boot process. Here are more details on how these features reduce your risk of security compromises:

  • Hardware-based Root of Trust (HWRoT) enables signature validation and embedded public signing keys support a variety of security use cases during the life cycle of the product, including key revocation, to ensure a safe and secure signing environment
  • Multi-staged secure boot process rooted in hardware establishes and extends the sequential chains-of-trust starting from the HWRoT through loading firmware from external SPI Flash to the final code execution
  • Secure firmware update mechanism eliminates any backdoor methods to upgrade non-authenticated firmware
  • Signature verification is performed by the active firmware image to ensure any new firmware image to be programmed into the nonvolatile memory is correctly signed
  • Pre-execution validation of Microchip and third-party signatures
  • Strong, industry accepted, cryptographic engines quickly align with evolving security technologies
  • Attestation support produces on-demand evidence that the product is configured and performing the function intended without any tampering

We are committed to aligning with industry security requirements, driving security awareness and defining common security requirements for all data centers. We provide a secure supply chain so you will not have to worry about your product arriving compromised.

Our Trusted Platform support features are built into our storage/server infrastructure solutions, which include IOCs and HBAs, ROCs and RAID adapters, SAS expanders, and PCIe® switches. They are also available in our storage endpoint solutions, which include Flashtec® NVMe™ controllers for SSDs and secure storage backplane controllers. Our PolarFire® FPGAs enable secure system I/O expansion and power sequencing capabilities. The CEC1712 secure boot companion device with integrated Soteria firmware supports and enhances the security capabilities of unprotected ASICs, SoCs, BMCs, CPUs, and GPUs in data center applications. Our dedicated EEC1005 Universal Backplane Management (UBM) companion device with integrated firmware provides advanced drive status capabilities for storage backplanes in compliance with SFF-TA-1005.

Data Center Security Products/Solutions and Features


Security Feature       Product/Solution      
  SmartROC 3200 and SmartIOC 2200 Controllers SXP24G- Expanders Switchtec™ PCIe® Switches Flashtec® NVMe™ Controllers CEC1712 Secure Boot Companion with Soteria EEC1005 Secure UBM Controller  PolarFire® FPGAs
 PolarFIre SOC FPGAs
Hardware Root of Trust Supported Supported,
customer enabled
Supported,
customer enabled
Supported Supported  Supported  Supported
Secure Boot Supported Supported, customer enabled Supported, customer enabled Supported, customer enabled Supported Supported Supported
Secure Firmware Update Supported Supported, customer enabled Supported, customer enabled Supported, customer enabled Supported Supported Supported
Secure Key Management Supported Supported, customer enabled Supported, customer enabled Supported, customer enabled Supported Supported Supported
Secure Debug Supported Supported, customer enabled Supported, customer enabled Supported, customer enabled Supported Supported Supported
Attestation Supported Supported, customer enabled Not Supported Supported, customer enabled Hardware Capable   Supported