We Share our Knowledge.

In-depth insights, provocative thought leadership and authoritative reports written from a deep engineering mind-set. Our subject matter experts dig into topics that matter, with critical analysis and problem resolution based on innovative thinking.

Secure Cloud-Native Fabric

Secure Cloud-Native Fabric

The Aricent SCF software framework and its components can be used to develop products and services that address goal-based security for digital products and ecosystems.

Preview

Security Validation for the Cloud

The Aricent security validation approach follows a proven maturity model of constantly applying and updating security controls to improve the security posture.

Preview
Security Validation for the Cloud

Future Security at the Edge and in the Cloud

The Aricent security validation approach follows a proven maturity model of constantly applying and updating security controls to improve the security posture.

Preview
Threat Management

Threat Management

The threat management process includes 4 distinct stages to ensure security preparedness: Impact evaluation, Vulnerability root cause analysis, Exploit method analysis & Remediation plan.

Preview
Packet Core for Cellular IoT

Packet Core for Cellular IoT

Aricent implements cellular IoT with our NB-IoT offering to provide wide-area coverage, long battery life, low-cost devices, low deployment costs and support of massive IoT connections.

Preview