Welcome!

News Feed Item

Sierraware Announces the Availability of SierraVisor and SierraTEE for 64-bit ARM Architectures

Hypervisor and Trusted Execution Environment (TEE) for big.LITTLE, Cortex-A53, and Cortex-A57

SUNNYVALE, Calif., Feb. 3, 2014 /PRNewswire-iReach/ -- Sierraware, the embedded virtualization company, today announced the release of SierraVisor and SierraTEE for 64-bit ARM silicon. The SierraVisor Hypervisor for 64-bit ARM architectures allows multiple operating systems, such as Linux, BSD, or Android, to run concurrently on big.LITTLE, Cortex-A53, and Cortex-A57-powered platforms.  Furthermore, equipment manufacturers can leverage the SierraTEE SDK to add a Trusted Execution Environment to their ARM TrustZone-enabled 64-bit devices.

(Photo: http://photos.prnewswire.com/prnh/20140203/MN57288)

All most all next generation devices, from smartphones to microservers and headless residential gateways to 4G wireless infrastructure, will run on 64-bit ARM architectures. 64-bit computing overcomes the 4 GB memory barrier, enabling feature-rich, interactive applications such as gaming and high definition video display. As more and more devices move to 64-bit architectures, they will need to support important capabilities like virtualization and ARM TrustZone. Sierraware addresses this need by delivering high-performance, customizable hypervisor and TEE SDKs for 64-bit ARM silicon.

The SierraVisor Hypervisor for 64-bit ARM architectures:

  • Extends the life of applications by simulating the previous generation of hardware. Equipment vendors can swiftly migrate to new processors without porting existing software.
  • Allows legacy real time operating systems to run simultaneously with new open source platforms like Linux, BSD and Android.
  • Streamlines development by supporting SMP and AMP process management.
  • Secures sensitive data with a Trusted Execution Environment (TEE) available for every guest operating system.

SierraTEE for 64-bit ARM silicon allows devices to run a secure operating system and a normal, high-level operating system at the same time. SierraTEE protects confidential data like payment card data, DRM-protected content, and passwords from malicious attacks and malware. SierraTEE has been designed for a wide range of products that require trusted virtualization, such as set-top boxes, wireless and wired routers, mobile phones, and other consumer devices.

"As memory and processing requirements for embedded systems continue to grow, more and more hardware manufacturers will transition to 64-bit architectures," said Gopal Jayaraman, CEO of Sierraware. "SierraVisor and SierraTEE for 64-bit silicon are delivered as source code SDKs, enabling ARM-based hardware developers to customize the code over time to adapt to software and hardware changes."

For information about supported SOCs, contact Sierraware at [email protected].

About Sierraware

Sierraware, founded in 2010, is a leading provider of virtualization and security solutions for ARM processors. Sierraware offers the SierraVisor Hypervisor, the SierraTEE Trusted Execution Environment, and communications and media toolkits for a wide range of ARM architectures. For more information, visit http://www.sierraware.com.

Media Contact: Gopu Subramanian, Sierraware, 1-408-337-6400, [email protected]

News distributed by PR Newswire iReach: https://ireach.prnewswire.com

SOURCE Sierraware

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
On Dice.com, the number of job postings asking for skill in Amazon Web Services increased 76 percent between June 2015 and June 2016. Salesforce.com saw its own skill mentions increase 37 percent, while DevOps and Cloud rose 35 percent and 28 percent, respectively. Even as they expand their presence in the cloud, companies are also looking for tech professionals who can manage projects, crunch data, and figure out how to make systems run more autonomously. Mentions of ‘data science’ as a skill ...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, will provide economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session will also include a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.