For VendorsBlog

Security Hardware

Security Hardware

Hardware security as a discipline originated out of cryptographic engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity and measures to ensure that the supply chain that built the product is secure, among other things.

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.

Some providers in this discipline consider that the key difference between hardware security and software security is that hardware security is implemented using "non-Turing-machine" logic (raw combinatorial logic or simple state machines). One approach, referred to as "hardsec", uses FPGAs to implement non-Turing-machine security controls as a way of combining the security of hardware with the flexibility of software.

Hardware backdoors are backdoors in hardware. Conceptionally related, a hardware Trojan (HT) is a malicious modification of an electronic system, particularly in the context of an integrated circuit.

A physical unclonable function (PUF) is a physical entity that is embodied in a physical structure and is easy to evaluate but hard to predict. Further, an individual PUF device must be easy to make but practically impossible to duplicate, even given the exact manufacturing process that produced it. In this respect, it is the hardware analog of a one-way function. The name "physically unclonable function" might be a little misleading as some PUFs are clonable, and most PUFs are noisy and therefore do not achieve the requirements for a function. Today, PUFs are usually implemented in integrated circuits and are typically used in applications with high-security requirements.

Many attacks on sensitive data and resources reported by organizations occur from within the organization itself.

The most popular products in category Security Hardware All category products

Nozomi Networks Guardian
7
15
Мобильный терминал ВРТ800
5
11
MSi Platform
11
13
Tresys XD Air
14
17
WizLAN VIT-400 Cyber Network Security
0
20
Netshield
20
4
VADO One Way Data Diode
13
17
NXP Semiconductors IoT Gateway Solution
5
17
mPrest HLS
12
6
OpenGear IoT Gateways
0
17
SNC Binary Armor
SNC
9
12
SNC Cybersecurity Correlation Automation (CSCA)
SNC
11
11

Suppliers Security Hardware

Cisco
AUT...
  • AUT
  • AUS
  • BRA
  • CAN
  • CHN
  • DEU
  • ESP
  • FRA
  • GBR
  • HUN
  • MEX
  • NOR
  • POL
  • SGP
  • UKR
  • USA
Akamai Technologies
ARE...
  • ARE
  • ARG
  • AUS
  • BRA
  • CAN
  • CHE
  • CHL
  • CHN
  • CRI
  • CZE
  • DEU
  • DNK
  • ESP
  • FRA
  • GBR
  • IRL
  • ISR
  • IND
  • ITA
  • JPN
  • KOR
  • MEX
  • MYS
  • NLD
  • POL
  • SWE
  • SGP
  • TWN
  • USA
Cloudflare
AUS...
  • AUS
  • BEL
  • CHN
  • DEU
  • FRA
  • GBR
  • JPN
  • PRT
  • SGP
  • USA
Hikvision
ARE...
  • ARE
  • CHN
  • IND
  • NLD
  • TKM
  • USA
Nozomi Networks
ARE...
  • ARE
  • AUS
  • BRA
  • CAN
  • CHE
  • DEU
  • DNK
  • ESP
  • GBR
  • ITA
  • NLD
  • PRT
  • SGP
  • USA
CUJO
AUS...
  • AUS
  • BRA
  • CHN
  • FIN
  • GBR
  • HUN
  • LTU
  • MYS
  • PHL
  • USA
Nexcom
CHN...
  • CHN
  • GBR
  • ITA
  • TWN
  • USA
Iron Mountain Inc.
ARE...
  • ARE
  • ARG
  • AUT
  • BEL
  • BGR
  • CAN
  • CHE
  • CHN
  • COL
  • CZE
  • DEU
  • DNK
  • EST
  • EGY
  • FIN
  • FRA
  • GHA
  • GRC
  • IDN
  • ISR
  • IND
  • ITA
  • LSO
  • LTU
  • LVA
  • MEX
  • MYS
  • NLD
  • NOR
  • PER
  • PHL
  • POL
  • SWE
  • SVK
  • THA
  • USA
  • ZAF
  • SRB

Vendors Security Hardware

DELL
All countries
Cisco
AUT...
  • AUT
  • AUS
  • BRA
  • CAN
  • CHN
  • DEU
  • ESP
  • FRA
  • GBR
  • HUN
  • MEX
  • NOR
  • POL
  • SGP
  • UKR
  • USA
Check Point
AUT...
  • AUT
  • AUS
  • BEL
  • BRA
  • CAN
  • CHE
  • CHN
  • CZE
  • DEU
  • DNK
  • ESP
  • FIN
  • FRA
  • GBR
  • GRC
  • HUN
  • ISR
  • IND
  • ITA
  • NLD
  • NOR
  • PRT
  • ROU
  • SWE
  • USA
Palo Alto Networks
ARE...
  • ARE
  • AUT
  • AUS
  • BEL
  • BRA
  • CAN
  • CHE
  • CHN
  • CZE
  • DEU
  • DNK
  • ESP
  • FIN
  • FRA
  • GBR
  • GRC
  • IDN
  • ISR
  • IND
  • ITA
  • JPN
  • KOR
  • MEX
  • MYS
  • NLD
  • NOR
  • NZL
  • PHL
  • PRT
  • QAT
  • SAU
  • SWE
  • SGP
  • THA
  • TUR
  • TWN
  • USA
  • VNM
Axis
ARE...
  • ARE
  • AUS
  • BRA
  • CAN
  • COL
  • CZE
  • DEU
  • ESP
  • GBR
  • IND
  • ITA
  • NLD
  • NZL
  • POL
  • ROU
  • SWE
  • SGP
  • THA
  • TUR
  • USA
  • ZAF
Acunetix
GBR...
  • GBR
  • MLT
  • USA
Akamai Technologies
ARE...
  • ARE
  • ARG
  • AUS
  • BRA
  • CAN
  • CHE
  • CHL
  • CHN
  • CRI
  • CZE
  • DEU
  • DNK
  • ESP
  • FRA
  • GBR
  • IRL
  • ISR
  • IND
  • ITA
  • JPN
  • KOR
  • MEX
  • MYS
  • NLD
  • POL
  • SWE
  • SGP
  • TWN
  • USA
Cloudflare
AUS...
  • AUS
  • BEL
  • CHN
  • DEU
  • FRA
  • GBR
  • JPN
  • PRT
  • SGP
  • USA
Hikvision
ARE...
  • ARE
  • CHN
  • IND
  • NLD
  • TKM
  • USA
Nozomi Networks
ARE...
  • ARE
  • AUS
  • BRA
  • CAN
  • CHE
  • DEU
  • DNK
  • ESP
  • GBR
  • ITA
  • NLD
  • PRT
  • SGP
  • USA
CUJO
AUS...
  • AUS
  • BRA
  • CHN
  • FIN
  • GBR
  • HUN
  • LTU
  • MYS
  • PHL
  • USA
Zyxel
ARG...
  • ARG
  • AUT
  • AUS
  • BEL
  • BGR
  • BRA
  • CHE
  • CHN
  • COL
  • CZE
  • DEU
  • DNK
  • ECU
  • EST
  • EGY
  • ESP
  • FIN
  • FRA
  • GBR
  • HUN
  • ISR
  • IND
  • ITA
  • KOR
  • KAZ
  • LTU
  • LVA
  • MYS
  • NLD
  • NOR
  • PHL
  • PAK
  • POL
  • ROU
  • SWE
  • SGP
  • SVK
  • THA
  • TUR
  • TWN
  • TZA
  • UKR
  • USA
  • VNM
  • ZAF
Nexcom
CHN...
  • CHN
  • GBR
  • ITA
  • TWN
  • USA
Opengear
AUS...
  • AUS
  • CAN
  • GBR
  • USA
Wibu-Systems
CHN...
  • CHN
  • DEU
  • GBR
  • NLD
  • USA
Iron Mountain Inc.
ARE...
  • ARE
  • ARG
  • AUT
  • BEL
  • BGR
  • CAN
  • CHE
  • CHN
  • COL
  • CZE
  • DEU
  • DNK
  • EST
  • EGY
  • FIN
  • FRA
  • GHA
  • GRC
  • IDN
  • ISR
  • IND
  • ITA
  • LSO
  • LTU
  • LVA
  • MEX
  • MYS
  • NLD
  • NOR
  • PER
  • PHL
  • POL
  • SWE
  • SVK
  • THA
  • USA
  • ZAF
  • SRB

F.A.Q. about Security Hardware

What is hardware information security?

Hardware means various types of devices (mechanical, electromechanical, electronic, etc.), which solve information protection problems with hardware. They impede access to information, including through its disguise. The hardware includes: noise generators, surge protectors, scanning radios and many other devices that "block" potential channels of information leakage or allow them to be detected. The advantages of technical means are related to their reliability, independence from subjective factors and high resistance to modification. The weaknesses include a lack of flexibility, relatively large volume and mass and high cost. The hardware for information protection includes the most diverse technical structures in terms of operation, device and capabilities, which ensure the suppression of disclosure, protection against leakage and counteraction to unauthorized access to sources of confidential information.

Where is the hardware used to protect information?

Hardware information protection is used to solve the following problems:

  • conducting special studies of technical means of ensuring production activity for the presence of possible channels of information leakage;
  • identification of information leakage channels at various objects and in premises;
  • localization of information leakage channels;
  • search and detection of industrial espionage tools;
  • countering unauthorized access to confidential information sources and other actions.

What is the classification of information security hardware?

According to the functional purpose, the hardware can be classified into detection tools, search tools and detailed measurements and active and passive countermeasures. At the same time, according to their technical capabilities, information protection tools can be general-purpose, designed for use by non-professionals in order to obtain preliminary (general) estimates, and professional complexes that allow for a thorough search, detection and precision measurement of all the characteristics of industrial espionage equipment. As an example of the former, we can consider a group of IP electromagnetic radiation indicators, which have a wide range of received signals and rather low sensitivity. As a second example - a complex for the detection and direction finding of radio bookmarks, designed to automatically detect and locate radio transmitters, radio microphones, telephone bookmarks and network radio transmitters.