Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

VIA Launches ACE-CNX Customized Security Service

VIA ACE-CNX provides tailor-made data security through hardware-based data encryption
  • 02 September, 2009 14:11

<p>Taipei, Taiwan, 1 September 2009 - VIA Technologies, Inc, a leading innovator of power efficient x86 processor platforms, today announced the VIA ACE-CNX security service, helping customers harness the power of the Advanced Cryptographic Engine (ACE) embedded at the core of all VIA processors.</p>
<p>The customer-centered VIA ACE-CNX service allows VIA’s team of security experts to work closely with the customer, implementing data encryption standards that meet with widely accepted international standards. The advantage of data encryption through the hardware, as opposed to software, is that the encryption is seamless, fast and entirely unobtrusive to the end user.</p>
<p>The flexible VIA ACE-CNX service can be employed in a wide variety of scenarios where seamless data encryption is required. Data encryption can be used to protect valuable proprietary content in digital signage infrastructures; it can also be used to protect data in remote access or VPN scenarios while application and database repositories can be encrypted, making the threat of data theft redundant.</p>
<p>“ACE-CNX is all about working in tandem with the customer to create a tailor-made solution that takes advantage of our unique hardware-based security engine,” said Daniel Wu, Vice President, VIA Embedded Platform Division, VIA Technologies, Inc. “VIA is seeking to empower our customers with a more rational security infrastructure that offers a compelling alternative to today’s software driven solutions.”</p>
<p>VIA Nano, VIA C7 and VIA Eden processors have an integrated security engine that can be used to encrypt and decrypt data on-the-fly. The Advanced Cryptographic Engine also provides a range of crucial security features that can be used as the center of an infrastructure where data is made secure through a rigorous and virtually unbreakable cryptographic algorithm. This is entirely unique to VIA; no other processor on the market today can support these security features from within the CPU.</p>
<p>An Advanced Security Engine
All VIA processors are unique in that they have been designed with a number of key security features embedded in their core. These include a Secure Hash Algorithm (SHA-1 and SHA-256), published by the National Institute of Standards and Technology (NIST). The SHA standard is widely accepted as being one of the most secure algorithms available.</p>
<p>VIA’s ACE also includes AES (Advanced Encryption Standard) Encryption, an encryption standard adopted by the U.S. government that comprises three block ciphers and is now used worldwide. A Montgomery Multiplier is also included along with NX Execute Protection and a random number generator.</p>
<p>For more information about the VIA ACE-CNX service please visit:</p>
<p>A more detailed white paper is also available to download here:</p>
<p>About VIA Technologies, Inc.
VIA Technologies, Inc is the foremost fabless supplier of power efficient x86 processor platforms that are driving system innovation in the PC, client, ultra mobile and embedded markets. Combining energy-saving processors with digital media chipsets and advanced connectivity, multimedia and networking silicon enables a broad spectrum of computing and communication platforms, including its widely acclaimed ultra compact mainboards. Headquartered in Taipei, Taiwan, VIA’s global network links the high tech centers of the US, Europe and Asia, and its customer base includes the world’s top OEMs and system integrators.</p>
<p>VIA PR Contact</p>
<p>International: Richard Brown
Phone: (886)-2-2218-5452 #6201
Fax: (886)-2-8218-6752
<p>Note to reporters, editors and writers: VIA is written in ALL CAPS.</p>
<p>The names of actual companies and products mentioned herein may be the trademarks of their respective owners.</p>

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Media Release

More media release