Cadence® system design and verification solutions, integrated under our System Development Suite, provide the simulation, acceleration, emulation, and management capabilities.
System Development Suite Related Products A-Z
Cadence® digital design and signoff solutions provide a fast path to design closure and better predictability, helping you meet your power, performance, and area (PPA) targets.
Full-Flow Digital Solution Related Products A-Z
Cadence® custom, analog, and RF design solutions can help you save time by automating many routine tasks, from block-level and mixed-signal simulation to routing and library characterization.
Overview Related Products A-Z
Driving efficiency and accuracy in advanced packaging, system planning, and multi-fabric interoperability, Cadence® package implementation products deliver the automation and accuracy.
Cadence® PCB design solutions enable shorter, more predictable design cycles with greater integration of component design and system-level simulation for a constraint-driven flow.
An open IP platform for you to customize your app-driven SoC design.
Comprehensive solutions and methodologies.
Helping you meet your broader business goals.
A global customer support infrastructure with around-the-clock help.
24/7 Support - Cadence Online Support
Locate the latest software updates, service request, technical documentation, solutions and more in your personalized environment.
Cadence offers various software services for download. This page describes our offerings, including the Allegro FREE Physical Viewer.
Get the most out of your investment in Cadence technologies through a wide range of training offerings.
This course combines our Allegro PCB Editor Basic Techniques, followed by Allegro PCB Editor Intermediate Techniques.
Virtuoso Analog Design Environment Verifier 16.7
Learn learn to perform requirements-driven analog verification using the Virtuoso ADE Verifier tool.
Exchange ideas, news, technical information, and best practices.
The community is open to everyone, and to provide the most value, we require participants to follow our Community Guidelines that facilitate a quality exchange of ideas and information.
It's not all about the technlogy. Here we exchange ideas on the Cadence Academic Network and other subjects of general interest.
Cadence is a leading provider of system design tools, software, IP, and services.
As I noted in a previous blog post, Cadence IT experts are engaging with customers to help them develop and improve their CAD infrastructures. One issue that some customers need help with is data security. There are many "best practices" that can be helpful, particularly for small companies and startups who don't have full-fledged IT departments.
I talked to Saravanan Nagarjan, senior IT architect at Cadence, about some of the "best practices" Cadence recommends to EDA tool users. Cadence implements many of these practices itself to protect customer data inside VCAD (Virtual CAD) chambers, which can provide everything from a place to run diagnostics to a complete CAD infrastructure for a small company.
An article in the December 2010 issue of Processor magazine provides a more detailed look at how Cadence secures customer intellectual property in its Hosted Design Services engagements, which are basically VCAD chambers with design tools provided on a software-as-a-service (SaaS) basis. As the article notes, Cadence also works with customers through its EDA Infrastructure Acceleration Services to address concerns such as data and network security.
Rule Number One: Know Where Your Data Is
Saravanan said that Cadence advocates a "data centric" security approach, and the first step is to simply locate the data. "Often times, customers don't know where their data is," he noted. "It could be on servers, it could be on laptops; data can be anywhere. Once you know where your crown jewels are, it's easier to protect them."
Once located, it's important to identify or classify the data, monitor critical data, and track its movements. This helps prevent data loss. Internally, Cadence uses a methodology called "Label, Log & Secure" that sets forth protocols for logging customer data and tracking every data transfer.
Here are some other points that emerged from our discussion:
Inside the Cloud
There's a lot of interest these days in cloud computing, and Cadence is "closely monitoring" developments in that space, Saravanan said. His view, however, is that "the security is still maturing" for public clouds. "The cloud should adhere to our standard security practices with things like firewalls, VPN and security monitoring devices, and at the same time we have to worry about the trust model of the cloud," he said. "The trust model should include third party security audits and should adhere to legal and contractual obligations as well. We need to make sure the confidentiality, integrity, and validity of the data inside the cloud is there." Similar views were voiced in the Processor magazine article cited above.
In addition to data security, Cadence IT experts are helping customers solve problems and answer questions related to networking, thin clients, Linux, tool licensing and management, and private and public clouds. "If you need any help with IT, we are more than willing to provide advice," Saravanan said.