Products & Solutions

10/12/2024

Hardware authentication: Why the iShield Key MIFARE is a milestone!

by Alexander Summerer

In his new blog post, Alexander Summerer presents nothing less than a game changer with the brand new iShield Key MIFARE. He explains why this is the case and why it is more attractive for companies and institutions than many other FIDO tokens due to its diverse fields of application.

Latest Blog Posts

Technology

02/12/2024

Social Robots: Where AI Meets Data Protection

by Matthias Poppel

Beyond industrial machines, a new wave of social robots is reshaping human interaction – from assisting in nursing homes to greeting at airports. But with this innovation comes a critical question: How can we protect sensitive data while enabling AI-driven relationships? Discover the balance between cutting-edge robotics and data security compliance in this latest blog by Matthias Poppel.

Products & Solutions

26/11/2024

How the Security Upgrade Kit helps companies comply with global regulations

by Roland Marx

In his second blog post, Roland Marx makes it clear why the new Security Upgrade Kit is the ideal solution for companies that need to comply with global regulations, industry standards and requirements. It provides the long-term, effective solution for securing embedded systems, IoT and OT applications.

Products & Solutions

12/11/2024

Security Upgrade Kit: How to secure your embedded systems, IoT and OT applications

by Roland Marx

In his first blog post, Roland Marx introduces the new Security Upgrade Kit, which is the solution for data security of embedded systems, IoT and OT applications and improves access control for companies with its Security Level 2 microSD card. He discusses the vulnerabilities of embedded systems, global regulatory efforts and standards and explains why companies should opt for the Security Upgrade Kit.

Technology

09/10/2024

Autonomous Cars: A Technological Revolution in Slow Motion

by Matthias Poppel

Autonomous vehicles are often associated with robotaxis, but this complex use case faces major hurdles. Meanwhile, in controlled environments like warehouses and highways, autonomous driving is already proving its value. In his latest blog post, Matthias Poppel explores how the real revolution is unfolding beyond city streets.

Products & Solutions

30/09/2024

Swissbit e.MMC EM-30: A Solid Foundation for Embedded Systems

by Alexander Lenz

Tired of the same old e.MMC storage solutions? Our EM-30 series offers a fresh perspective, combining reliability with exceptional performance. But what sets it apart? Dive into this blog post by Alex Lenz to discover how Swissbit's commitment to quality, durability, and customization makes the EM-30 the ideal choice for your embedded systems.

Technology

27/08/2024

Authentication 101: A comparison of five well known authentication methods

by Alexander Summerer

In his second "Authentication 101" blog post, Alexander Summerer presents selected methods for authenticating and protecting digital identities. He shows where their strengths and weaknesses lie. Finally, he gives a brief assessment of each method. The summary focuses mainly on the iShield Key series.

Technology

20/08/2024

Data Processing: 5 key benefits of Edge Computing

by Martin Schreiber

Martin Schreiber explores the essentials of Edge Computing and points out how and why Edge Computing offers a number of benefits that make it an important component of modern IT infrastructures. The five key benefits of Edge Computing contain security, mobility, speed and latency tolerance, cost, availability and stability.

Products & Solutions

05/08/2024

Authentication 101: 5 Advantages of the iShield Key series

by Alexander Summerer

In his first "Authentication 101" blog post Alexander Summerer points out how and why the iShield Key series secures a user's digital identity by serving as an authenticator on websites, applications, online services and corporate networks.

Technology

23/07/2024

Authentication Basics: 7 Benefits of Using Hardware Tokens for MFA

by Chris Collier

In his latest blog post of the "Authentication Basics" series, Chris Collier explores the essentials of multi-factor authentication (MFA) and points out how and why hardware tokens provide unparalleled security and ease of use. Discover why these physical devices are a top choice for robust online protection against phishing and other cyber threats.

Technology

15/07/2024

Flash Memory on a Rollercoaster Ride: Q3 Update

by Martin Schreiber

Fasten your seat belt! The flash memory market's wild ride continues in 2024. Demand for AI and data centers soars, while automotive sputters. Join our Head of Product Management Martin Schreiber to see where the market's headed next and who's leading the charge.

Technology

08/07/2024

(Edge) AI: From Science Fiction to Reality

by Matthias Poppel

Today, AI makes us think of generative AI like ChatGPT, but the future lies in Edge AI, working directly at data sources. This shift will revolutionize daily life and demand robust system design. Five years ago, ChatGPT seemed like science fiction. Now, AI permeates various processes and products. Join our CSMO Matthias Poppel as he explores how Edge AI will transform our lives and the new challenges it brings.

Technology

02/07/2024

FIPS 140-3: Enhancing Cryptographic Security for Modern Challenges

by Chris Collier

In his latest blog post, Chris Collier explores FIPS 140-3, the new standard for cryptographic modules used by the U.S. government, replacing FIPS 140-2. This update addresses the need for improved security amid technological advancements and new threats. Learn more about key updates such as alignment with international standards, enhanced security requirements, and rigorous testing protocols.

Technology

26/06/2024

EU Regulation NIS2: Don't Get Caught Off Guard!

by Alexander Summerer

The EU's NIS2 Directive is tightening cybersecurity for critical infrastructures. Navigating these regulations can be daunting. Alexander Summerer explains what NIS2 means for your organization and how Multi-Factor Authentication (MFA) can help you comply. Discover who is affected, the penalties for non-compliance, and why USB tokens might be the most secure and cost-effective MFA solution.

Technology

18/06/2024

Authentication Basics: An Introduction to FIDO2

by Chris Collier

Join our IAM technologist, Chris Collier, in a new blog series about the basics of authentication, Identity & Access Management, and cybersecurity. In this first post, Chris explores the fundamentals of the FIDO2 standard, offering essential information and practical tips for software administrators aiming to implement this robust security protocol.

Products & Solutions, Technology

13/06/2024

MFA is essential: Why a hardware token can make all the difference

by Claus Gründel

At the beginning of June, the Christian Democratic Union (CDU) in Germany was the victim of a serious cyberattack. Hackers exploited a VPN vulnerability and accessed sensitive data. This attack underlines (once again) the urgent need for multi-factor authentication (MFA), says Claus Gründel, General Manager for Swissbit's security solutions, and emphasizes the importance of decisive action in cyber security.

Company News

29/05/2024

Swissbit Insights: New PCIe Gen4 Testing Technology

by Lars Lust

Swissbit's next-gen PCIe products are on their way! But first, they face a rigorous new testing process. Our innovative PCIe Gen4 testing tech ensures top-tier quality. Learn how it works and its impact on future advancements from Marco Beyer and Lars Lust in our latest blog post.

Technology

23/04/2024

Secure Boot: A Key to Digital Security

by Johann Philipp Thiers

Have you ever wondered how your computer system safeguards itself at startup? Our security specialist Johann-Philipp Thiers provides an introductory look into “Secure Boot” exploring its crucial role in protecting your data and devices. Discover how this technology builds a "Chain of Trust" and why it's essential for maintaining a secure digital environment.

Products & Solutions

05/03/2024

Clearing the Fog: Swissbit's EM-30 e.MMC Compatibility Guide for Seamless System Integration

by Alexander Lenz

Are you curious about seamless system integration for your embedded projects? Join Alex Lenz as he offers insights and delves into Swissbit's EM-30 e.MMC Compatibility Guide, crafted to streamline development processes and minimize costs. Read now and unlock the key to efficient and reliable system development.

Products & Solutions

01/02/2024

Eight Compelling Reasons to Opt for Reliable Storage Solutions

by Martin Schreiber

In today's data-driven world, the reliability and security of memory solutions are paramount in a vast array of applications. While consumer-grade products may be sufficient for everyday tasks, they often fall short in demanding industrial and professional applications. Let's delve into the key differentiators that set Swissbit products apart from their consumer counterparts.

Company News

29/01/2024

Flash Memory Market 2024: Navigating the Rollercoaster

by Martin Schreiber

Dive into 2024's flash memory market with Martin Schreiber's incisive analysis. This year, the sector resembles a rollercoaster, marked by fluctuating production and varied demand trends. Get essential insights and learn more about Swissbit's strategic recommendations to steer through this dynamic market landscape.

Technology

17/01/2024

Unlocking the Future of Cybersecurity: Zero Trust Solutions with Hardware Authentication

by Alexander Summerer

Dive into the concept of 'zero trust' and learn practical implementation strategies to safeguard your company's critical resources and data against internal and external threats. In his blog post – and our corresponding white paper – Alexander Summerer reveals how zero trust principles, including hardware-based authentication like FIDO security keys, can elevate your security measures and proactively minimize risks.

Products & Solutions

26/10/2023

Customization at Swissbit: Tailoring Memory Solutions to Meet Unique Needs

by Mischa Inauen

Are standard memory or security products falling short of your requirements? If so, then you should take a closer look at this blog post by Mischa Inauen. He provides an insightful overview of Swissbit’s comprehensive suite of customization options – from improving endurance and performance to addressing labeling, packaging, and many more.

Products & Solutions

01/08/2023

Introducing: Latest 100+ layer industrial grade 3D TLC e.MMC and SD Memory Card Solutions

by Martin Schreiber

Designed for IoT devices and embedded electronics, the new EM-30/36 and S-50/56(u) series offer robustness, reliability, and cost-efficiency. With up to 100k PE cycles endurance and capacities up to 512GB, they provide secure and long-lasting storage for demanding applications in challenging environments. Martin Schreiber provides a closer look into specs, benefits, and application fields.

Products & Solutions

24/07/2023

Introducing SBDM: Your Storage Device Management Tool

by Hasan Dullaj

Just recently we launched the latest version of the Swissbit Device Manager (SBDM), our management tool for Swissbit storage solutions. In this blog post, Product Manager Hasan Dullaj provides a brief overview of features, advantages, and the new firmware update functionality.

Technology

28/02/2023

Application-Optimized SSDs: Life in the Digital Fast Lane

by Matthias Poppel

In their highly competitive market, data center operators need to adapt their storage equipment to match the application load as exactly as possible. This blog post shows how that can be accomplished and what cars in the fast lane have to do with it.

Technology

10/01/2023

4 reasons to use industrial 3D TLC NAND flash as pseudo-SLC

by Roger Griesemer

The ability to operate TLC in pseudo-SLC mode with one bit per cell continues to carve out a niche existence. However, for a vast number of applications the economic advantages of this configuration outweigh the disadvantages. We've compiled four arguments to consider.

Reasons to use 3D TLC NAND flash as pseudo-SLC
Technology

31/10/2022

Wrong Flash Storage: 5 main reasons for occurring issues

by Roger Griesemer

NAND Flash SSDs are generally accepted as standard and universal storage devices. Nevertheless, many things can go wrong if you don’t choose the right SSD for your application. Here are the main areas where damage may occur by using unsuited products.

Technology

16/08/2022

Flash Memory in the Era of the Software-Defined Car

by Martin Schreiber

The implementation of effective cyber security risk mitigation mechanisms as well as the functional split between hardware and software are major challenges for automotive OEMs. The Swissbit Automotive competence offers solution paths for both areas - and even more.

Flash Memory in the Era of the Software-Defined Car
Technology

30/06/2022

5 reasons why CFexpress is the future

by Roger Griesemer

Do you want to know, why does CFexpress have the potential to become the number 1 removable storage media for demanding industrial applications? We've compiled five arguments.

Advantages of CFexpress
Products & Solutions

01/03/2022

The secret of Swissbit product quality: Part II

by Lars Lust

After we’ve learned more about the intensive set of tests Swissbit performs before a product is released, the second part of this series is about the ongoing measures to maintain the product quality once volume production has started.

Product quality