VIA Launches ACE-CNX Customized Security Service
- 02 September, 2009 14:11
<p>Taipei, Taiwan, 1 September 2009 - VIA Technologies, Inc, a leading innovator of power efficient x86 processor platforms, today announced the VIA ACE-CNX security service, helping customers harness the power of the Advanced Cryptographic Engine (ACE) embedded at the core of all VIA processors.</p>
<p>The customer-centered VIA ACE-CNX service allows VIA’s team of security experts to work closely with the customer, implementing data encryption standards that meet with widely accepted international standards. The advantage of data encryption through the hardware, as opposed to software, is that the encryption is seamless, fast and entirely unobtrusive to the end user.</p>
<p>The flexible VIA ACE-CNX service can be employed in a wide variety of scenarios where seamless data encryption is required. Data encryption can be used to protect valuable proprietary content in digital signage infrastructures; it can also be used to protect data in remote access or VPN scenarios while application and database repositories can be encrypted, making the threat of data theft redundant.</p>
<p>“ACE-CNX is all about working in tandem with the customer to create a tailor-made solution that takes advantage of our unique hardware-based security engine,” said Daniel Wu, Vice President, VIA Embedded Platform Division, VIA Technologies, Inc. “VIA is seeking to empower our customers with a more rational security infrastructure that offers a compelling alternative to today’s software driven solutions.”</p>
<p>VIA Nano, VIA C7 and VIA Eden processors have an integrated security engine that can be used to encrypt and decrypt data on-the-fly. The Advanced Cryptographic Engine also provides a range of crucial security features that can be used as the center of an infrastructure where data is made secure through a rigorous and virtually unbreakable cryptographic algorithm. This is entirely unique to VIA; no other processor on the market today can support these security features from within the CPU.</p>
<p>An Advanced Security Engine
All VIA processors are unique in that they have been designed with a number of key security features embedded in their core. These include a Secure Hash Algorithm (SHA-1 and SHA-256), published by the National Institute of Standards and Technology (NIST). The SHA standard is widely accepted as being one of the most secure algorithms available.</p>
<p>VIA’s ACE also includes AES (Advanced Encryption Standard) Encryption, an encryption standard adopted by the U.S. government that comprises three block ciphers and is now used worldwide. A Montgomery Multiplier is also included along with NX Execute Protection and a random number generator.</p>
<p>For more information about the VIA ACE-CNX service please visit:
<p>A more detailed white paper is also available to download here:
<p>About VIA Technologies, Inc.
VIA Technologies, Inc is the foremost fabless supplier of power efficient x86 processor platforms that are driving system innovation in the PC, client, ultra mobile and embedded markets. Combining energy-saving processors with digital media chipsets and advanced connectivity, multimedia and networking silicon enables a broad spectrum of computing and communication platforms, including its widely acclaimed ultra compact mainboards. Headquartered in Taipei, Taiwan, VIA’s global network links the high tech centers of the US, Europe and Asia, and its customer base includes the world’s top OEMs and system integrators. www.via.com.tw</p>
<p>VIA PR Contact</p>
<p>International: Richard Brown
Phone: (886)-2-2218-5452 #6201
<p>Note to reporters, editors and writers: VIA is written in ALL CAPS.</p>
<p>The names of actual companies and products mentioned herein may be the trademarks of their respective owners.</p>
- Google Home and Amazon Echo are patched, but how many more IoT devices are vulnerable?
- Industrial IoT explosion is making Australian CSOs “anxious” as IoT-security investments lag world
- Despite rising risk awareness, SecDevOps still too little, too late for most Australian companies
- KRACK Attack: Are You Vulnerable?
- Is fake news dangerous? Security pros say yes