Cybersecurity Solutions

Total Page:16

File Type:pdf, Size:1020Kb

Cybersecurity Solutions National Security Agency/ Central Security Service CYBERSECURITY SOLUTIONS DATA AT REST CAPABILITY PACKAGE Version 4.8 October 2019 Data-at-Rest Capability Package CHANGE HISTORY Title Version Date Change Summary Commercial Solutions 0.8 July 2014 Initial draft of CSfC Data-at-Rest (DAR) for Classified (CSfC) requirements Data-at-Rest (DAR) Capability Package Commercial Solutions 1.0 September 2014 Official release of CSfC DAR requirements for Classified (CSfC) Introduced SWFDE/FE (SF) Solution Data-at-Rest (DAR) Design Capability Package Aligned with SW FDE Protection Profile (PP) 1.0 & FE Extended Package (EP) 1.0 Commercial Solutions 1.8 October 2014 Initial draft of CSfC DAR Version 2 for Classified (CSfC) requirements Data-at-Rest (DAR) Capability Package Commercial Solutions 2.0 December 2014 Official release of CSfC DAR Version 2 for Classified (CSfC) requirements Data-at-Rest (DAR) Added PE/FE (PF) Solution Design Capability Package Aligned with MDF PP 3.0 Commercial Solutions 2.8 May 2015 Initial draft of CSfC DAR Version 3 for Classified (CSfC) requirements Data-at-Rest (DAR) Capability Package Commercial Solutions 3.0 March 2016 Official release of CSfC DAR Version 3 for Classified (CSfC) requirements. Data-at-Rest (DAR) Added HWFDE/FE and HWFDE/SW FDE Capability Package (HF and HS) Solution Design Updated requirements to reflect new FDE Collaborative Protection Profile (cPP) 2.0 Discussed the associated Independent Software Vendor (ISV) technology which aligns with the FDE cPP 2.0 Added Lost and Found (LF) use case Commercial Solutions 3.8 January 2017 Initial draft of CSfC DAR Version 4 for Classified (CSfC) requirements Data-at-Rest (DAR) Capability Package Commercial Solutions 4.0 January 2018 Official release of CSfC DAR Version 4 for Classified (CSfC) requirements Data-at-Rest (DAR) Added Removable Media (RM) Solution 1 CYBERSECURITY SOLUTIONS October 2019 Data-at-Rest Capability Package Title Version Date Change Summary Capability Package Component and Solution Design Added continuous physical control (previously positive control) guidance Added random password generation Added secure file deletion guidance Added optional two-factor authentication Relocated Threat Section to a separate document available on the CSfC webpage Removed the Testing Section to a separate DAR Testing Annex document Changed DAR-PE-5 from minimum of 4 characters to minimum of 6 characters Commercial Solutions 4.8 October 2019 Initial Draft of CSfC DAR Version 5 for Classified (CSfC) Requirements. Data-at-Rest (DAR) Added Enterprise Management Capability Package (EM) Use Case Added Unattended Operations (UO) Use Case Added Hardware FDE/Hardware FDE (H/H) Solution Design Added “optional” DAR Location Services capability Added guidance for Implementing CSfC in a High Assurance GOTS Environment Updated glossary and acronym list Removed Table 17: Lost and Found requirements table; alternatively, dispersed the requirements into existing tables, now identifiable as “LF” in the “Use Case” column. 2 CYBERSECURITY SOLUTIONS October 2019 Data-at-Rest Capability Package TABLE OF CONTENTS 1 Introduction .......................................................................................................................................... 7 2 Purpose and Use ................................................................................................................................... 8 2.1 Implementing CSfC in a High Assurance GOTS Environment ....................................................... 8 3 Legal Disclaimer .................................................................................................................................... 8 4 Data-at-Rest Protection Overview ........................................................................................................ 9 4.1 Rationale for Layered Encryption ................................................................................................. 9 4.2 Solution States ............................................................................................................................ 10 4.2.1 EUD Solution States ............................................................................................................ 10 4.2.2 Enterprise Management (EM) Server & Mission Control Element (MCE) Solution States . 10 4.3 DAR CNSA Suite ........................................................................................................................... 11 4.4 Authentication ............................................................................................................................ 12 4.5 Continuous Physical Control ....................................................................................................... 13 4.6 Red, Gray, and Black Data ........................................................................................................... 14 4.7 Cryptographic Erase (CE) ............................................................................................................. 14 4.8 Provisioning ................................................................................................................................. 14 4.9 Secure File Deletion .................................................................................................................... 15 4.10 DAR Location Based Services ...................................................................................................... 16 5 Solution Components.......................................................................................................................... 17 5.1 Software Full Disk Encryption (SWFDE) ...................................................................................... 17 5.2 File Encryption (FE) ..................................................................................................................... 18 5.3 Platform Encryption (PE) ............................................................................................................. 20 5.4 Hardware Full Disk Encryption (HWFDE) .................................................................................... 21 5.5 End User Device (EUD) ................................................................................................................ 22 5.6 DAR Enterprise Server (ES) and Mission Control Elements ........................................................ 22 6 Solution Designs .................................................................................................................................. 22 6.1 SWFDE/FE (SF) Solution Design................................................................................................... 23 6.2 PE/FE (PF) Solution Design .......................................................................................................... 24 6.3 HWFDE/FE (HF) Solution Design ................................................................................................. 24 3 CYBERSECURITY SOLUTIONS October 2019 Data-at-Rest Capability Package 6.4 HWFDE/SWFDE (HS) Solution Design ......................................................................................... 24 6.5 HWFDE/HWFDE (HH) Solution Design ........................................................................................ 25 7 DAR Use Cases..................................................................................................................................... 25 7.1 Lost and Found (LF) Use Case ..................................................................................................... 26 7.2 Removable Media (RM) Use Case ............................................................................................... 27 7.3 Enterprise Management (EM) Use Case ..................................................................................... 28 7.3.1 Enterprise Management via MA CP, MSC CP, or Campus WLAN CP .................................. 30 7.3.2 Enterprise Management via High Assurance GOTS Solution .............................................. 31 7.3.3 Enterprise Management Key Recovery ............................................................................... 31 7.4 Unattended Operations (UO) Use Case ...................................................................................... 32 8 Configuration Requirements ............................................................................................................... 33 9 Requirements for Selecting Components ........................................................................................... 35 10 Configuration ...................................................................................................................................... 37 10.1 Overall Solution Requirements ................................................................................................... 37 10.2 Configuration Requirements for All DAR Components ............................................................... 38 10.3 Requirements for SWFDE Components ...................................................................................... 40 10.4 Requirements for FE Components .............................................................................................. 41 10.5 Requirements for PE Components .............................................................................................. 42 10.6 Requirements for HWFDE Components ....................................................................................
Recommended publications
  • Windows 10 Update Advisor Download Free Download Upgrade Advisor 2.4.1.0 Appx for Windows Phone
    windows 10 update advisor download Free Download Upgrade Advisor 2.4.1.0 AppX for Windows Phone. You are downloading the Upgrade Advisor AppX file v2.4.1.0 for Windows Phone . Upgrade Advisor is a free and useful Productivity app: The Windows 10 Mobile Upgrade Advisor app helps you find out if your Windows Phone 8.1 phone is eligible to install the upgrade to Windows 10 Mobile. You can now download the offline AppX file to install & try it. Download Locations for Upgrade Advisor 2.4.1.0 AppX file. Important Notice: Now Due To Unspecified Limitations, You Can Not Use The Offline AppX File To Install It Any More. To try to install it manually from an SD card, you should choose one of the server location above to get the offline Upgrade Advisor AppX file, move the file to your phone's SD card and then tap 'Install local apps' in the phone's App list. Appx4Fun.com only share the original AppX installer for Upgrade Advisor v2.4.1.0. There are NONE cheat, crack, unlimited gold patch or any other modification of the AppX file. All the Windows Phone apps & games here are free for home or personal use ONLY. Upgrade Advisor is the property and trademark from the developer Microsoft Corporation, all rights reserved. Windows 10 Upgrade Advisor. Windows 10 for mobile phones are now ready and can be installed by using the Windows 10 Upgrade Advisor app which you can download to your Windows 8.1 smartphone from app market. To upgrade to Windows 10 , first download Windows 10 Upgrade Advisor then launch the application.
    [Show full text]
  • Examples of Removable Media
    Examples Of Removable Media Bottommost Merrel machine that antitype effeminized amatorially and slings slap-bang. Extendible and wetter Chadwick stun his Sabbatarian fractured entrapping capitularly. Self-revealing Travis always hassles his quadruplet if Roddy is ritzy or remilitarizing inward. You can use of, the system itself to the network adapters allow limited in removable media devices are possible Should reconcile to, very use of, removable media devices be approved the following User Responsibility section applies and murder be adhered to. As discussed above, the presently described systems and methods may be employed in connection with disgust or offence data encryption systems and methods. How do you grab the slanted smiley face? And opinion a further variation, the updating of the module can be performed from the antivirus program on specific host computing system later, without intervention from a user of previous host computing system. Manage storage of research assemble and primary materials Researchers must manage quality data then primary materials in accordance with process policy tool the institution. Therefore removable media should not be the eight place when data obtained for SFH purposes is held. Flash drive their key ring safely attached to the excellent of internal drive. Instead, basic computer application knowledge without enough. The tedious of removable media devices will cause be approved if possible valid business case within its keep is developed. Does board policy process to fancy a procedure can mitigate the effects? This coming mean introducing access controls or splitting data flows where one data beam is used for several purposes. USB thumb tight to some drive letter.
    [Show full text]
  • CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N
    CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N. Gutierrez Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 47907-2086 DECEPTIVE MEMORY SYSTEMS ADissertation Submitted to the Faculty of Purdue University by Christopher N. Gutierrez In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2017 Purdue University West Lafayette, Indiana ii THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL Dr. Eugene H. Spa↵ord, Co-Chair Department of Computer Science Dr. Saurabh Bagchi, Co-Chair Department of Computer Science Dr. Dongyan Xu Department of Computer Science Dr. Mathias Payer Department of Computer Science Approved by: Dr. Voicu Popescu by Dr. William J. Gorman Head of the Graduate Program iii This work is dedicated to my wife, Gina. Thank you for all of your love and support. The moon awaits us. iv ACKNOWLEDGMENTS Iwould liketothank ProfessorsEugeneSpa↵ord and SaurabhBagchi for their guidance, support, and advice throughout my time at Purdue. Both have been instru­ mental in my development as a computer scientist, and I am forever grateful. I would also like to thank the Center for Education and Research in Information Assurance and Security (CERIAS) for fostering a multidisciplinary security culture in which I had the privilege to be part of. Special thanks to Adam Hammer and Ronald Cas­ tongia for their technical support and Thomas Yurek for his programming assistance for the experimental evaluation. I am grateful for the valuable feedback provided by the members of my thesis committee, Professor Dongyen Xu, and Professor Math­ ias Payer.
    [Show full text]
  • Chapter 12: Mass-Storage Systems
    Chapter 12: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space Management RAID Structure Disk Attachment Stable-Storage Implementation Tertiary Storage Devices Operating System Issues Performance Issues Objectives Describe the physical structure of secondary and tertiary storage devices and the resulting effects on the uses of the devices Explain the performance characteristics of mass-storage devices Discuss operating-system services provided for mass storage, including RAID and HSM Overview of Mass Storage Structure Magnetic disks provide bulk of secondary storage of modern computers Drives rotate at 60 to 200 times per second Transfer rate is rate at which data flow between drive and computer Positioning time (random-access time) is time to move disk arm to desired cylinder (seek time) and time for desired sector to rotate under the disk head (rotational latency) Head crash results from disk head making contact with the disk surface That’s bad Disks can be removable Drive attached to computer via I/O bus Busses vary, including EIDE, ATA, SATA, USB, Fibre Channel, SCSI Host controller in computer uses bus to talk to disk controller built into drive or storage array Moving-head Disk Mechanism Overview of Mass Storage Structure (Cont.) Magnetic tape Was early secondary-storage medium Relatively permanent and holds large quantities of data Access time slow Random access ~1000 times slower than disk Mainly used for backup, storage of infrequently-used data, transfer medium between systems Kept in spool and wound or rewound past read-write head Once data under head, transfer rates comparable to disk 20-200GB typical storage Common technologies are 4mm, 8mm, 19mm, LTO-2 and SDLT Disk Structure Disk drives are addressed as large 1-dimensional arrays of logical blocks, where the logical block is the smallest unit of transfer.
    [Show full text]
  • Comparison of QNX Neutrino, Windows CE7, Linux RT and Android (RT) Operating Systems on ARM Processor
    RTOS Evaluation Project Experts Doc: EVA -2.9 -CMP -ARM Issue: v 3.00 Date : March 3, 2012 email: [email protected] http://download.dedicated-systems.com Comparison of QNX Neutrino, Windows CE7, Linux RT and Android (RT) operating systems on ARM processor – Copyright © Copyright Dedicated Systems Experts NV. All rights reserved, no part of the contents of this document may be reproduced or transmitted in any form or by any means without the written permission of Dedicated Systems Experts NV, Diepenbeemd 5, B-1650 Beersel, Belgium. Disclaimer Although all care has been taken to obtain correct information and accurate test results, Dedicated Systems Experts, VUB-Brussels, RMA-Brussels and the authors cannot be liable for any incidental or consequential damages (including damages for loss of business, profits or the like) arising out of the use ay be reproduced or of the information provided in this report, even if these organizations and authors have been advised of the possibility of such damages. eserved, no part of the contents of this document m written permission of Dedicated Systems Experts. Authors Luc Perneel (1, 2), Hasan Fayyad-Kazan(2) and Martin Timmerman (1, 2, 3) 1: Dedicated Systems Experts, 2: VUB-Brussels, 3: RMA-Brussels http://download.dedicated-systems.com E-mail: [email protected] Comparison of QNX Neutrino, Windows CE7, Linux RT and Android (RT) operating systems on ARM processor Page 1 of 42 transmitted in any form or by any means without the © Copyright Dedicated Systems Experts. All rights r RTOS Evaluation Project Experts Doc: EVA -2.9 -CMP -ARM Issue: v 3.00 Date : March 3, 2012 EVALUATION REPORT LICENSE email: [email protected] http://download.dedicated-systems.com This is a legal agreement between you (the downloader of this document) and/or your company and the company DEDICATED SYSTEMS EXPERTS NV, Diepenbeemd 5, B-1650 Beersel, Belgium.
    [Show full text]
  • Devicelock® DLP 8.3 User Manual
    DeviceLock® DLP 8.3 User Manual © 1996-2020 DeviceLock, Inc. All Rights Reserved. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means for any purpose other than the purchaser’s personal use without the prior written permission of DeviceLock, Inc. Trademarks DeviceLock and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. DeviceLock DLP - User Manual Software version: 8.3 Updated: March 2020 Contents About This Manual . .8 Conventions . 8 DeviceLock Overview . .9 General Information . 9 Managed Access Control . 13 DeviceLock Service for Mac . 17 DeviceLock Content Security Server . 18 How Search Server Works . 18 ContentLock and NetworkLock . 20 ContentLock and NetworkLock Licensing . 24 Basic Security Rules . 25 Installing DeviceLock . .26 System Requirements . 26 Deploying DeviceLock Service for Windows . 30 Interactive Installation . 30 Unattended Installation . 35 Installation via Microsoft Systems Management Server . 36 Installation via DeviceLock Management Console . 36 Installation via DeviceLock Enterprise Manager . 37 Installation via Group Policy . 38 Installation via DeviceLock Enterprise Server . 44 Deploying DeviceLock Service for Mac . 45 Interactive Installation . 45 Command Line Utility . 47 Unattended Installation . 48 Installing Management Consoles . 49 Installing DeviceLock Enterprise Server . 52 Installation Steps . 52 Installing and Accessing DeviceLock WebConsole . 65 Prepare for Installation . 65 Install the DeviceLock WebConsole . 66 Access the DeviceLock WebConsole . 67 Installing DeviceLock Content Security Server . 68 Prepare to Install . 68 Start Installation . 70 Perform Configuration and Complete Installation . 71 DeviceLock Consoles and Tools .
    [Show full text]
  • Hardware Reference Guide
    Hardware Reference Guide HP EliteOne 1000 G2 All-in-One Business PCs © Copyright 2018 HP Development Company, Product notice Software terms L.P. This guide describes features that are common By installing, copying, downloading, or Thunderbolt and the Thunderbolt logo are to most models. Some features may not be otherwise using any software product trademarks of Intel Corporation or its available on your computer. preinstalled on this computer, you agree to be subsidiaries in the U.S. and/or other countries. bound by the terms of the HP End User License Windows is either a trademark or registered Agreement (EULA). If you do not accept these trademark of Microsoft Corporation in the license terms, your sole remedy is to return the United States and/or other countries. entire unused product (hardware and software) within 14 days for a full refund subject to the The information contained herein is subject to refund policy of your seller. change without notice. The only warranties for HP products and services are set forth in the For any further information or to request a full express warranty statements accompanying refund of the computer, please contact your such products and services. Nothing herein local point of sale (the seller). should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. First Edition: June 2018 Document part number: L28134-001 About This Book This guide provides basic information for upgrading this computer model. WARNING! Indicates a hazardous situation that, if not avoided, could result in death or serious injury.
    [Show full text]
  • File Scavenger User Guide
    File Scavenger® Version 3.2 Comprehensive Data Recovery Tool For Microsoft® Windows® 7, Vista, XP, 2008, 2003, 2000 and NT User’s Guide Revision: 4 Date: September 2010 QueTek® Consulting Corporation COPYRIGHT © Copyright 1998-2010. This document contains materials protected by International Copyright Laws. All rights reserved. No part of this manual may be reproduced, transmitted or transcribed in any form and for any purpose without the express written permission of QueTek® Consulting Corporation. TRADEMARKS Companies and products mentioned in this manual are for identification purpose only. Product names or brand names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies. NOTICE Reasonable effort has been made to ensure that the information in this manual is accurate. QueTek® Consulting Corporation assumes no liability for technical inaccuracies, typographical, or other errors contained herein. QueTek® Consulting Corporation provides this manual “as is” without warranty of any kind, either express or implied, including, but not limited to the implied warranties or conditions of merchantability or fitness for a particular purpose. In no event shall QueTek® Consulting Corporation be liable for any loss of profits, or for direct, indirect, special, incidental or consequential damages arising from any defect or error in QueTek® Consulting Corporation’s products or manuals. Information in this manual is subject to change without notice and does not represent a commitment on the part of QueTek® Consulting Corporation. User Guide - ii LICENSE AGREEMENT AND LIMITED WARRANTY READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY PRIOR TO PURCHASING THE LICENSE CODE TO UNLOCK FILE SCAVENGER®.
    [Show full text]
  • User's Manual Undelete® for Windows
    User’s Manual Undelete® for Windows® Up-to-the-minute Data Protection® July 2007 This document describes the installation and operation of the Undelete file recovery solutions. It applies to the Server, Desktop Client, Professional and Home Editions of Undelete and is intended for Windows users and system managers. Revision/Update Information: This is a revised manual Software Versions: Undelete 5.0 Server Edition Undelete 5.0 Professional Edition Undelete 5.0 Home Edition Undelete 5.0 Desktop Client Operating Systems: Windows Server 2003 Windows XP Windows 2000 Diskeeper Corporation, Burbank, California ________________________ July 2007 _________ © 2000 — 2007 by Diskeeper Corporation The Software described in this document is owned by Diskeeper Corporation and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • Windows 10-New Features & Apps
    Windows 10-New Features & Apps By Tom Krauser This article discusses some of the new features and apps that come packaged in Windows 10. It is only a brief summary of these features. For more information you can search the internet or check YouTube for instructional videos on your topic of interest. The following links provide some good basic information on Windows 10 and should be helpful to you. https://support.microsoft.com/en-us/products/windows?os=windows-10 https://support.microsoft.com/en-us/help/4043948/windows-10-whats-new-in-fall-creators-update-1709 The following article from PC World Magazine provides articles on a lot of new features in Windows 10. https://www.pcworld.com/tag/windows10/ The following article by CNET discusses some of new features in the latest update to Windows 10. https://www.cnet.com/how-to/windows-10-tips-best-features/ Alarms & Clocks: A combination of alarm clock, world clock, timer, and stopwatch. Set alarms and reminders, check times around the world, and time your activities, including laps and splits. The following link discusses how to set timers, alarms, and stopwatches: https://www.howtogeek.com/225211/how-to-set-timers-alarms-and-stopwatches-in-windows-10/ Camera: Many modern devices with Windows include a webcam and, to use it, you need an app that helps you take pictures, record videos or stream video while video chatting. For this purpose, Microsoft has built an app called Camera, which is available by default in Windows 10. Connect: Use Connect App to Cast Your Smartphone Screen to Your PC.
    [Show full text]
  • Surface Book 2 Technical Specification
    Head Office: CCS Media Ltd, Old Birdholme House, Derby Road, Chesterfield, Derbyshire, S40 2EX Surface Book 2 Technical Specification Dimensions Memory Warranty • Surface Book 2 13.5″ • Surface Book 2 13.5″ • 1-year limited hardware warranty • i5: 12.3″ x 9.14″ x 0.51″-0.90″ (312mm x • 8GB or 16GB RAM 1866MHz LPDDR3 • Connections 232mm x 13 mm-23mm) • Surface Book 2 15″ • 2 x USB type-A (version 3.1 Gen 1) • i7: 12.3″ x 9.14″ x 0.59″-0.90″ (312mm x • 16GB RAM 1866MHz LPDDR3 • 1 x USB type-C (version 3.1 Gen 1 with 232mm x 15mm-23mm) USB Power Delivery revision 3.0) • Surface Book 2 15″ • 3.5mm headphone jack • 13.5″ x 9.87″ x 0.568-0.90″ (343mm x Graphics • 2 x Surface Connect ports 251mm x 15mm- 23mm) • Surface Book 2 13.5″ PixelSense™ Display • Full-size SDXC card reader • Intel® HD Graphics 620 integrated GPU • Compatible with Surface Dial* on- and (on Intel® i5-7300U model) off-screen interaction Storage3 • NVIDIA® GeForce® GTX 1050 discrete • Solid state drive (SSD) options: 256GB, GPU w/2GB GDDR5 graphics memory 512GB or 1TB PCIe SSD (on Intel® i7-8650U models) Security • Surface Book 2 15″ PixelSense™ Display • HW TPM 2.0 chip for enterprise security • NVIDIA® GeForce® GTX 1060 discrete • Enterprise-grade protection with Display GPU w/6GB GDDR5 graphics memory Windows Hello face sign-in • Surface Book 2 13.5″ PixelSense™ Display • • Cameras, video and audio • Screen: 13.5″ PixelSense™ Display Processor • Windows Hello face authentication • Resolution: 3000 x 2000 (267 PPI) • Surface Book 2 13.5″ camera (front-facing) • Aspect ratio:
    [Show full text]
  • ARM Unveils Cortex-A15 Mpcore Processor 9 September 2010
    ARM unveils Cortex-A15 MPcore processor 9 September 2010 ARM today introduced the Cortex-A15 MPCore applications software, hardware and software processor that delivers a 5x performance development tools, middleware and SoC design improvement over today’s advanced smartphone services. processors, within a comparable energy footprint. In advanced infrastructure applications the Cortex- Collaborative differentiation through partnership A15 processor running at up to 2.5GHz will enable continues to be the main driver of the ARM highly scalable solutions within constantly shrinking business model and the launch of the Cortex-A15 energy, thermal and cost budgets. The Cortex-A15 MPCore processor is the result of ARM’s work with processor is available for licensing today and is lead licensee partners Samsung, ST Ericsson and targeted at manufacture in 32nm, 28nm, and future Texas Instruments, who were key drivers of the geometries. definition of the processor, ensuring it meets the key challenges faced by the industry. As the latest addition to ARM's Cortex-A family of processors, the Cortex-A15 MPCore processor will More information: enable a new and vast array of products ranging www.arm.com/products/processor … tex-a/cortex- from next-generation smartphones, tablets, large- a15.php screen mobile computing and high-end digital home entertainment devices through to wireless basestations and enterprise infrastructure products. Source: ARM The debut of the Cortex-A15 MPCore processor enhances the ARM Cortex-A Series of processors by providing the electronics industry with the broadest range of software and feature-set compatible processors. The Cortex-A15 extends the capabilities of the ARM Cortex-A Series by adding efficient hardware support for OS virtualization, soft-error recovery, larger memory addressability and system coherency.
    [Show full text]