Skip to content

Details

In working with ETSI NFV-SEC, we took the best practices (currently) available and examined the practical results for attestation, remote attestation, confinement technologies, network acceleration, memory sharing and security trust models. While it’s “low level”, the findings were very interesting, if the foundation of the building is not solid, it is very difficult to layer security above it. As all things “security” the use case is for Telecom / National / Critical Infrastructure / Sensitive environments.

Members are also interested in