STOCK TITAN

Lattice Launches Joint Cyber Resilience Reference Kit with EXOR International and TrustiPhi to Simplify Secure Device Development

Rhea-AI Impact
(Neutral)
Rhea-AI Sentiment
(Positive)
Tags

Key Terms

fpga technical
A field-programmable gate array (FPGA) is a type of computer chip whose internal wiring can be changed after it is made, allowing engineers to program custom hardware functions without designing a new chip. For investors, FPGAs matter because that flexibility lets companies quickly adapt products to new software, standards, or customer needs—like a toolbox that can be rearranged to build different machines—so demand and pricing can shift with trends in data centers, telecommunications, AI, and specialized electronics.
hardware‑rooted trust technical
Hardware-rooted trust is security built into a device’s physical components—typically a dedicated chip or module—that creates a tamper-resistant identity and stores cryptographic keys so software and data can be verified as genuine. For investors, it matters because products and systems with this built-in trust are harder to hack or counterfeit, lower regulatory and liability risk, and can command higher value or market access where customers require stronger security assurances.
secure boot technical
Secure boot is a built‑in firmware feature that checks the software a device starts with—like a bouncer checking IDs—allowing only software with a trusted digital seal to run. For investors it matters because it reduces the risk of malware, fraud or tampering that can harm a product’s reputation, trigger recalls or invite regulation, and therefore affects a company’s cybersecurity costs, customer trust and long‑term value.
iiot technical
A network of sensors, machines and controllers that collect and share operational data across factories, power plants, transport fleets and other industrial sites. Like a nervous system for heavy equipment, IIoT turns physical operations into continuous data streams that help companies spot problems sooner, cut downtime, improve efficiency and shift spending toward software and services—factors that can change profit margins, growth prospects and the value of industrial companies for investors.
cryptographic key technical
A cryptographic key is a digital code used like a lock-and-key to secure, access, or verify information and transactions online. For investors, these keys control ownership and movement of digital assets, protect sensitive data, and enable trustworthy records; losing or exposing a key can mean permanent loss of assets or fraud, while strong key management reduces custody, regulatory and cyber risk.
certificate management technical
Certificate management is the process of issuing, storing, renewing and revoking digital certificates that verify a website, app, or server is authentic and that data passed to it is encrypted. For investors it matters because poor certificate management can lead to website outages, lost customer trust, regulatory penalties or security breaches—similar to letting vital locks and ID badges expire, which can disrupt business operations and damage a company’s value and reputation.
secure update workflows technical
Secure update workflows are the end-to-end procedures companies use to create, test, digitally sign, distribute and install software or device updates in a way that prevents tampering, failed installs or unauthorized access. Like a locked, tracked delivery route for important parts, they protect operations, customer data and regulatory compliance, reducing the risk of cyberattacks, service outages or fines that can damage revenue and investor confidence.
authenticated communication technical
Authenticated communication is a message or document whose origin and integrity have been verified so investors can be confident it truly came from the claimed sender and was not altered. Like a sealed, signed letter or a tamper-proof label on a package, it matters because verified messages reduce the risk of fraud, support regulatory compliance, and ensure market participants make decisions based on reliable, traceable information.

HILLSBORO, Ore.--(BUSINESS WIRE)-- Lattice Semiconductor (NASDAQ: LSCC), the low power programmable leader, today announced a Cyber Resilience Reference Kit designed to help industrial and edge device manufacturers accelerate secure system design, developed in collaboration with EXOR International and TrustiPhi. Built on the Lattice MachXO3D™ secure control FPGA, EXOR International’s industrial edge platform, and TrustiPhi’s integrated security orchestration platform, the kit enables hardware‑rooted trust, secure lifecycle management, and industrial‑grade connectivity to accelerate cyber resilient system design.

“Security can no longer be an afterthought, especially at the industrial edge. With this collaboration, we’re giving customers a practical, integrated way to accelerate secure system development and support emerging requirements such as the EU Cyber Resilience Act,” said Karl Wachswender, Senior Principal System Architect Industrial, Lattice Semiconductor. “Through our early access program, major industrial companies evaluated the reference kit in real‑world environments. Their strong interest and feedback helped shape a solution that brings together the strengths of three companies to establish trust from the very first boot and maintain it throughout the product lifecycle.”

The new Lattice Cyber Resilience Reference Kit delivers secure onboarding, authenticated communication, and continuous integrity validation without adding design complexity, offering:

  • Hardware‑rooted trust with the Lattice MachXO3D FPGA, including secure boot, protected device identity, and platform firmware resiliency.
  • A production‑grade IIoT environment via EXOR International’s uSOM10 platform, enabling secure onboarding and authenticated industrial communication using JMobile and Corvina.
  • Centralized configuration of security features across device fleets with TrustiPhi ProtoPilot, providing cryptographic key and certificate management plus verified secure update workflows aligned with emerging cybersecurity standards.
  • A unified, plug‑and‑play workflow that lets developers evaluate end‑to‑end cyber resilience without stitching together multiple vendor tools.
  • A faster path to secure system design, helping teams explore practical threat mitigation, compliance readiness, and trusted device recovery.

“Industrial customers are looking for turnkey ways to embed cyber resilience into their devices without adding complexity. By combining our industrial platforms and software with Lattice’s secure FPGA technology and TrustiPhi’s lifecycle management, we’ve created a complete, real‑world environment that makes secure onboarding and trusted communication intuitive,” said Claudio Ambra, CTO, EXOR International.

“Hardware‑rooted trust is the foundation of long‑term device security, but many manufacturers and system owners struggle with the operational side of managing keys, certificates, and secure updates. Our collaboration with Lattice and EXOR International streamlines this experience into a single, cohesive kit that removes barriers to adoption and helps customers get hands‑on experience with proven security techniques,” said Ari Singer, CTO, TrustiPhi.

The Lattice Cyber Resilience Reference Kit is available through the Lattice website or authorized distribution partners.

Supporting Resources

  • For more information about Lattice Cyber Resilience Reference Kit, please watch the demo video or read the blog from EXOR International.
  • For more information about Lattice’s robust security offerings, please visit Lattice FPGA Security Solutions.
  • For more information about EXOR International’s industrial edge platform, visit X Platform, Corvina, or JMobile Suite page on their website.
  • For more information about TrustiPhi’s ProtoPilot security orchestration platform, please visit TrustiPhi ProtoPilot page on their website.

About Lattice Semiconductor

Lattice Semiconductor (NASDAQ: LSCC) is the low power programmable leader. We solve customer problems across the network, from the Edge to the Cloud, in the growing Communications, Computing, Industrial, Automotive, and Consumer markets. Our technology, long-standing relationships, and commitment to world-class support let our customers quickly and easily unleash their innovation to create a smart, secure, and connected world.

For more information about Lattice, please visit www.latticesemi.com. You can also follow us via LinkedIn, X, Facebook, YouTube, WeChat, or Weibo.

Lattice Semiconductor Corporation, Lattice Semiconductor (& design), and specific product designations are either registered trademarks or trademarks of Lattice Semiconductor Corporation or its subsidiaries in the United States and/or other countries. The use of the word “partner” does not imply a legal partnership between Lattice and any other entity.

GENERAL NOTICE: Other product names used in this publication are for identification purposes only and may be trademarks of their respective holders.

MEDIA CONTACT:

Sophia Hong

Lattice Semiconductor

503-268-8786

Sophia.Hong@latticesemi.com

 

INVESTOR CONTACT:

Rick Muscha

Lattice Semiconductor

408-826-6000

Rick.Muscha@latticesemi.com

Source: Lattice Semiconductor