Technology

30/07/2025

PCIe 5.0 vs. PCIe 4.0: High-Speed Interfaces Meet Industrial Reality

- Martin Schreiber

In recent years, discussions about high-speed connections in computer technology have focused on the transition from PCIe 4.0 to PCIe 5.0, especially given the increasing prevalence of next-generation CPUs and motherboards. First, I examine the theory and practice surrounding the performance advantages. Then, I address thermal limitations and explain why 4-channel NAND is still preferred in industrial environments. Finally, I present my conclusions.

Latest Blog Posts

Technology

23/07/2025

MFAをすり抜ける新たな脅威「Adversary-in-the-Middle(AitM)攻撃」の台頭

- Chris Collier

近年、多要素認証(MFA)をかいくぐる「Adversary-in-the-Middle(AitM)攻撃」が増加しています。本ブログでは、従来のMan-in-the-Middle(MitM)攻撃との違いを解説し、AitM攻撃に対抗するために有効な対策としてFIDO2についてご紹介します。

Technology

03/07/2025

デジタル証明アクセスの統合管理を1つのフィジカルセキュリティキーで実現

- Jan Quack

本ブログでは、企業における物理的アクセス管理とデジタル証明アクセス管理を総合的に考える重要性について解説します。はじめに、両者の違いを整理し、これらの統合が企業のセキュリティ強化にどのように寄与するのかを説明します。最後に、スイスビットが提供する最新の統合管理ソリューションを紹介します。

Technology

24/06/2025

スイスビットのSDカードとmicroSDカードが選ばれる理由

- Thierry Egloff

本ブログでは、スイスビットが提供するSDカードおよびmicroSDカードが過酷な環境下でも高い耐久性を発揮できる理由を解説します。耐久性を高める独自の技術や設計に触れながら、優れた性能をどのように実現しているのかをご紹介します。

Technology

18/06/2025

When Failure is Not an Option: Swissbit Storage Solutions for Mission-Critical Applications

- Norman Schmidt

In my latest blog post, I demonstrate once again how important data is in today's world. I also explain how Swissbit storage solutions secure data in different and demanding environments, including on land, in the air, at sea, and in space. Because: Swissbit storage solutions are designed to work when it matters most — when failure is not an option.

Technology

12/06/2025

ドイツ自社工場で製造:100ボール仕様に対応した高信頼性 e.MMC 「EM-30」

- Alexander Lenz

本ブログでは、スイスビットが提供するe.MMCシリーズ「EM-30」の最新モデルについてご紹介します。今回のアップデートでは、新たに独ベルリンの自社工場で製造された100ボール仕様の製品がラインアップに加わりました。この新モデルは、最先端のBiCS5技術を採用し、車載用途にも対応しています。これにより、産業向けメモリソリューションとして、さらなる性能と信頼性の向上を実現しました。

Technology

13/05/2025

How phishing resistant authentication can secure critical infrastructure from cyber threats

- Jan Quack

In my new blog post, I examine the critical infrastructure sector. This sector is becoming an increasingly common target of cyberattacks around the world. I will demonstrate how phishing-resistant authentication can effectively protect these facilities . Finally, I will show you the innovative, technologically advanced authentication solutions that Swissbit offers to protect digital identities.

Technology

07/05/2025

Cyber Resilience Act: Who is affected by CRA, and what needs to be done now

- Matthias Poppel

At Embedded World in March, one of the hottest topics was the EU's new Cyber Resilience Act (CRA). In his blog post, Matthias Poppel outlines who is affected, what obligations the CRA entails, and why companies must act now to ensure their products remain marketable in the EU beyond 2027.

Technology

06/05/2025

Swissbit Storage Solutions for Data Centers, Enterprise and Edge Servers

- Norman Schmidt

The evolution of servers and data centers has fundamentally changed the way businesses operate. As efficiency and data processing capabilities increase, the need for reliable and robust data storage solutions is also growing. In this article, I discuss the challenges companies face and how Swissbit provides the ideal support with innovative storage solutions tailored for data centers, enterprise solutions and edge servers.

Technology

06/05/2025

A unified physical and logical access management solution in one Security Key

- Jan Quack

In my first blog post, I will explore why it is advantageous for companies to consider physical and logical access management together. First, I will explain the difference, and then I will discuss the advantages of such a combined solution for companies. Finally, I present the solution that Swissbit offers.

Technology

02/05/2025

スイスビットのネットワーク向けおよび通信用途向けストレージ

- Norman Schmidt

このブログ投稿では、ネットワークおよび情報通信業界におけるストレージ製品の重要性について紹介します。世界中の企業は、厳しい環境下でも重要なデータを安全かつ確実に管理し、常にアクセスできる状態を求めています。これらの課題を解決するために、スイスビットの専門知識を活かした具体的なソリューションをご提案します。

Technology

30/04/2025

NVMeを産業用ストレージに利用するメリットとは?

- Norman Schmidt

本ブログでは、NVMe(不揮発性メモリ・エクスプレス)の概要を詳しく解説し、その重要性と利点を紹介します。また、NVMe技術に対する理解を深めていただけるよう、スイスビットのストレージ製品がサポートするNVMeの特長についても説明します。

Technology

29/04/2025

What makes Swissbit SD & microSD-Cards so special

- Thierry Egloff

In my first blog post, I analyze the factors that enable certain SD and microSD cards to withstand harsh conditions. I discuss the features that enhance their durability and explains why Swissbit SD and microSD cards are the most durable in harsh environments.

Technology

03/04/2025

Bypassing MFA: The Rise of Adversary-in-the-Middle Attacks

- Chris Collier

In my new article, I examine Adversary-in-the-Middle (AitM) attacks and compares this novel approach to traditional Man-in-the-Middle (MitM) attacks. The article shows how multi-factor authentication (MFA) can be bypassed as a core feature, but there is an effective way to prevent this: FIDO2

Technology

31/03/2025

認証 101: 企業向けのパスキーとは?

- Travis Dunn

今回の「認証 101」シリーズでは、FIDOパスキーの進展と企業での導入の可能性について解説します。Microsoft、Google、Appleは個人向けにパスワードレス認証を推進していますが、企業でもパスキーの導入は進むのでしょうか?結論としては、「ハードウェア認証」を使用したパスキーの導入をおすすめします。

Technology

20/03/2025

認証 101: なぜハードウェア認証が企業にとって魅力的なのか?

- Alexander Summerer

「認証101」シリーズの3回目は、「なぜハードウェア認証が企業にとって魅力的なのか?」について詳しく説明します。まず、FIDOセキュリティキーの重要なポイントを解説し、次にスイスビットのiShield Keyシリーズを例に、ハードウェア認証が企業にとってどのように有益であるかを具体的に解説します。

Technology

13/02/2025

[German Special] Doppelte Umwälzung am Kassenmarkt

- Matthias Poppel

Die Kassenbranche befindet sich im Umbruch – und dies gleich in zweifacher Hinsicht. Denn der Trend zum Soft-PoS-System, oft im Rahmen gemischter Kassenlandschaften implementiert, macht die Fiskalisierung komplexer. Zugleich rollt eine Welle strengerer Cybersecurity-Anforderungen auf die Hersteller zu – angeführt vom EU Cyber Resilience Act, der auch Kassen-Systeme betrifft!

Technology

12/02/2025

Swissbit Storage for Network and Communications

- Norman Schmidt

In this article, Norman Schmidt definitively examines the network and telecommunications industry (NetCom). These companies around the world depend on their critical data being kept secure, accessible, and reliable under the most demanding conditions. Norman clearly outlines the solutions and the significant benefits for these companies of relying on Swissbits' expertise to meet the challenges they face.

Technology

05/02/2025

Advantages of NVMe Features for Industrial Storage

- Norman Schmidt

In his first blog post, Norman Schmidt provides a comprehensive overview of NVMe, emphasizing its significance and the advantages it offers. Additionally, he outlines which NVMe features are supported by Swissbit storage products, offering valuable insights for those seeking to understand the capabilities of these technologies.

Technology

29/01/2025

Authentication 101: Passkeys for Enterprises?

- Travis Dunn

In his new blog post for the “authentication 101” series, Travis Dunn takes a closer look at the development of FIDO Passkeys. Microsoft, Google and Apple are pushing the topic of passwordless authentication on the consumer side but is it realistic that passkeys will soon be used in companies? In his conclusion, Travis recommends another existing alternative: hardware authentication.

Technology

17/01/2025

EU Regulation DORA: How hardware authentication can secure financial companies

- Travis Dunn

The Digital Operational Resilience Act (DORA) is the next major EU regulation to come into force. The aim of the EU regulation is to strengthen the IT security of European financial companies. Hardware authentication via FIDO Security Key can help effectively, as this article by Travis Dunn shows.

Technology

08/01/2025

Authentication 101: What makes hardware authentication so attractive to companies?

- Alexander Summerer

In his third "Authentication 101" blog post, Alexander explores the question of why hardware authentication is very attractive for companies. He highlights the most important aspects for the use of FIDO security keys. Using the iShield Key series as an example, he shows that Swissbit has assumed the role of technology leader in the FIDO security key sector.

Technology

02/01/2025

ソーシャルロボット:AIとデータ保護

- Matthias Poppel

今日、ロボットの進化は産業機械の活躍の範囲を超えて、ソーシャルロボットと呼ばれる新たな技術が、介護施設での介助から空港での出迎えといったさまざまな場面で登場しはじめています。しかし、このイノベーションには重要な課題が伴います。それは、AIの主導によって人との交流を実現する一方で、機密データはどのように保護すれば良いのかという点です。このブログ投稿では、最先端のロボット工学とデータセキュリティコンプライアンスのバランスについてご紹介します。

Technology

02/12/2024

Social Robots: Where AI Meets Data Protection

- Matthias Poppel

Beyond industrial machines, a new wave of social robots is reshaping human interaction – from assisting in nursing homes to greeting at airports. But with this innovation comes a critical question: How can we protect sensitive data while enabling AI-driven relationships? Discover the balance between cutting-edge robotics and data security compliance in this latest blog by Matthias Poppel.

Technology

10/10/2024

自律型走行車:スローモーションのように進む技術革命

- Matthias Poppel

自律型走行車といえばロボタクシーが思い浮かびますが、この複雑な走行環境での用途には高度な技術が要求されます。その一方で、倉庫や高速道路などの管理された環境においては、自動運転はすでにその要求に対応した価値が証明されています。このブログ記事では、実際の技術革命が、特に市街地以外の環境で、どのように展開されているかを紹介します。

Technology

09/10/2024

Autonomous Cars: A Technological Revolution in Slow Motion

- Matthias Poppel

Autonomous vehicles are often associated with robotaxis, but this complex use case faces major hurdles. Meanwhile, in controlled environments like warehouses and highways, autonomous driving is already proving its value. In his latest blog post, Matthias Poppel explores how the real revolution is unfolding beyond city streets.

Technology

05/09/2024

認証101:よく知られている5つの認証方法の比較

- Alexander Summerer

「認証101」シリーズの2回目は、デジタルIDを認証・保護する方法を紹介します。まず、各認証方法の長所と短所がどこにあるかを紹介し、最後にそれぞれの簡単な評価を示します。まとめの項では、iShield Keyシリーズについても触れています。

Technology

27/08/2024

Authentication 101: A comparison of five well known authentication methods

- Alexander Summerer

In his second "Authentication 101" blog post, Alexander Summerer presents selected methods for authenticating and protecting digital identities. He shows where their strengths and weaknesses lie. Finally, he gives a brief assessment of each method. The summary focuses mainly on the iShield Key series.

Technology

25/08/2024

データ処理:エッジコンピューティングの5つの主なメリット

- Martin Schreiber

このブログ記事では、エッジコンピューティングの基本に加えて、現代のITインフラストラクチャの重要な構成要素となる多くの利点を、どのように、そしてなぜ提供するのかを説明します。さらに、エッジコンピューティングの5つの主なメリットとして、セキュリティ、モビリティ、速度と遅延の許容度、コスト、可用性と安定性を紹介します。

Technology

20/08/2024

Data Processing: 5 key benefits of Edge Computing

- Martin Schreiber

Martin Schreiber explores the essentials of Edge Computing and points out how and why Edge Computing offers a number of benefits that make it an important component of modern IT infrastructures. The five key benefits of Edge Computing contain security, mobility, speed and latency tolerance, cost, availability and stability.

Technology

01/08/2024

認証の基礎:MFAにハードウェアトークンを使用する7つのメリット

- Chris Collier

「認証の基礎」シリーズの最新ブログ記事では多要素認証(MFA)の基本を解説し、さらに、ハードウェアトークンが他の認証方法よりも優れたセキュリティや使いやすさを実現する仕組みとその理由を説明します。この物理的な認証デバイスが、フィッシングやその他のサイバー脅威に対するオンライン保護機能として最適な理由をご確認ください。

Technology

23/07/2024

Authentication Basics: 7 Benefits of Using Hardware Tokens for MFA

- Chris Collier

In his latest blog post of the "Authentication Basics" series, Chris Collier explores the essentials of multi-factor authentication (MFA) and points out how and why hardware tokens provide unparalleled security and ease of use. Discover why these physical devices are a top choice for robust online protection against phishing and other cyber threats.

Technology

15/07/2024

Flash Memory on a Rollercoaster Ride: Q3 Update

- Martin Schreiber

Fasten your seat belt! The flash memory market's wild ride continues in 2024. Demand for AI and data centers soars, while automotive sputters. Join our Head of Product Management Martin Schreiber to see where the market's headed next and who's leading the charge.

Technology

13/07/2024

(エッジ)AI:SFから現実へ

- Matthias Poppel

今日、AIというとChatGPTのような生成AIを思い浮かべますが、将来はデータの生成源で直接処理を実行するエッジAIが存在感を増すでしょう。この変化は日常生活に革命をもたらす一方で、堅牢なシステム設計が求められます。5年前、ChatGPTはSFのようでした。今やAIはさまざまなプロセスや製品に浸透しています。この先、エッジAIが私たちの生活をどのように変えるのか、そしてそれがもたらす新たな課題について考えてみましょう。

Technology

08/07/2024

(Edge) AI: From Science Fiction to Reality

- Matthias Poppel

Today, AI makes us think of generative AI like ChatGPT, but the future lies in Edge AI, working directly at data sources. This shift will revolutionize daily life and demand robust system design. Five years ago, ChatGPT seemed like science fiction. Now, AI permeates various processes and products. Join our CSMO Matthias Poppel as he explores how Edge AI will transform our lives and the new challenges it brings.

Technology

05/07/2024

FIPS 140-3:暗号セキュリティを強化し現代のサイバーセキュリティ課題に対応

- Chris Collier

このブログ記事では、米国政府がFIPS 140-2に代えて新たに採用した暗号化モジュール標準のFIPS 140-3について説明します。このアップデートは、技術の進歩や新たな脅威が広がる現在の環境において、ますます高まるセキュリティ強化のニーズに対応するものです。ぜひ、国際標準規格への準拠、セキュリティ要件の強化、厳格なテストプロトコルといった、主要な更新内容についてご確認ください。

Technology

02/07/2024

FIPS 140-3: Enhancing Cryptographic Security for Modern Challenges

- Chris Collier

In his latest blog post, Chris Collier explores FIPS 140-3, the new standard for cryptographic modules used by the U.S. government, replacing FIPS 140-2. This update addresses the need for improved security amid technological advancements and new threats. Learn more about key updates such as alignment with international standards, enhanced security requirements, and rigorous testing protocols.

Technology

26/06/2024

EU Regulation NIS2: Don't Get Caught Off Guard!

- Alexander Summerer

The EU's NIS2 Directive is tightening cybersecurity for critical infrastructures. Navigating these regulations can be daunting. Alexander Summerer explains what NIS2 means for your organization and how Multi-Factor Authentication (MFA) can help you comply. Discover who is affected, the penalties for non-compliance, and why USB tokens might be the most secure and cost-effective MFA solution.

Technology

20/06/2024

認証の基礎:FIDO2の紹介

- Chris Collier

今回から、認証、アイデンティティとアクセス管理、サイバーセキュリティの基礎をテーマとして、スイスビットのIAMテクノロジストが解説する新しいブログシリーズを始めます。この最初の投稿では、FIDO2標準の基礎を説明し、この強固なセキュリティプロトコルの実装を目指すソフトウェア管理者にとって重要な情報と実用的なヒントを紹介します。

Technology

18/06/2024

Authentication Basics: An Introduction to FIDO2

- Chris Collier

Join our IAM technologist, Chris Collier, in a new blog series about the basics of authentication, Identity & Access Management, and cybersecurity. In this first post, Chris explores the fundamentals of the FIDO2 standard, offering essential information and practical tips for software administrators aiming to implement this robust security protocol.

Products & Solutions, Technology

13/06/2024

MFA is essential: Why a hardware token can make all the difference

- Claus Gründel

At the beginning of June, the Christian Democratic Union (CDU) in Germany was the victim of a serious cyberattack. Hackers exploited a VPN vulnerability and accessed sensitive data. This attack underlines (once again) the urgent need for multi-factor authentication (MFA), says Claus Gründel, General Manager for Swissbit's security solutions, and emphasizes the importance of decisive action in cyber security.

Technology

23/05/2024

セキュアブート:デジタルセキュリティの鍵

- Johann Philipp Thiers

コンピュータシステムの起動プロセスがどのように保護されているか疑問に思ったことはないでしょうか?スイスビットのセキュリティスペシャリストが、「セキュアブート」の概要と併せてデータとデバイスを保護する上での重要な役割について紹介します。また、このテクノロジーがどのように「信頼の連鎖」を構築するのか、そしてそれが安全なデジタル環境を維持するためになぜ不可欠なのかを説明します。

Technology

23/04/2024

Secure Boot: A Key to Digital Security

- Johann Philipp Thiers

Have you ever wondered how your computer system safeguards itself at startup? Our security specialist Johann-Philipp Thiers provides an introductory look into “Secure Boot” exploring its crucial role in protecting your data and devices. Discover how this technology builds a "Chain of Trust" and why it's essential for maintaining a secure digital environment.

Technology

17/01/2024

Unlocking the Future of Cybersecurity: Zero Trust Solutions with Hardware Authentication

- Alexander Summerer

Dive into the concept of 'zero trust' and learn practical implementation strategies to safeguard your company's critical resources and data against internal and external threats. In his blog post – and our corresponding white paper – Alexander Summerer reveals how zero trust principles, including hardware-based authentication like FIDO security keys, can elevate your security measures and proactively minimize risks.

Technology

28/02/2023

Application-Optimized SSDs: Life in the Digital Fast Lane

- Matthias Poppel

In their highly competitive market, data center operators need to adapt their storage equipment to match the application load as exactly as possible. This blog post shows how that can be accomplished and what cars in the fast lane have to do with it.

Technology

10/01/2023

4 reasons to use industrial 3D TLC NAND flash as pseudo-SLC

- Roger Griesemer

The ability to operate TLC in pseudo-SLC mode with one bit per cell continues to carve out a niche existence. However, for a vast number of applications the economic advantages of this configuration outweigh the disadvantages. We've compiled four arguments to consider.

Technology

31/10/2022

Wrong Flash Storage: 5 main reasons for occurring issues

- Roger Griesemer

NAND Flash SSDs are generally accepted as standard and universal storage devices. Nevertheless, many things can go wrong if you don’t choose the right SSD for your application. Here are the main areas where damage may occur by using unsuited products.

Technology

16/08/2022

Flash Memory in the Era of the Software-Defined Car

- Martin Schreiber

The implementation of effective cyber security risk mitigation mechanisms as well as the functional split between hardware and software are major challenges for automotive OEMs. The Swissbit Automotive competence offers solution paths for both areas - and even more.

Technology

30/06/2022

5 reasons why CFexpress is the future

- Roger Griesemer

Do you want to know, why does CFexpress have the potential to become the number 1 removable storage media for demanding industrial applications? We've compiled five arguments.

Technology

14/12/2021

SATA vs. PCIe: Competition or Coexistence?

- Roger Griesemer

SATA is dead, long live PCIe! Wait a minute, it’s not that simple! Let's take a closer look at both interfaces and check where each of them can show their advantages.

Technology

19/07/2021

Explained: Garbage Collection

- Tim Niggemeier

The clear up process of being able to release entire blocks in flash memory is called “garbage collection”. But how does it work?

Technology

18/07/2021

From CompactFlash to SD Express

- Roger Griesemer

Industrial memory cards over the course of time and what to look out for when you need to use them in industrial applications.

Technology

17/07/2021

Explained: “Bad Block” Management

- Tim Niggemeier

How do “bad blocks” occur in NAND flash and what do flash and storage medium manufacturers have to pay attention to during production in order to avoid early failures? Let's have a look!