Presented in Spanish / En español.
Duration: 34 minutes 10 seconds
Available On Demand
SecEdge Security Platform overview, including secure boot & updates, threat detection and remediation, and protecting AI at the Edge. Presented in Spanish / En español.
Speakers:
Julia Narvaez |
|
Module: 1 of 4
Duration: 19 minutes
Available On Demand
This module covers the fundamentals of device security. First we will describe the concept of a secure enclave (creating partitioned memory for secure environments). Next, the concepts of a Trusted Execution Environment (TEE) and corresponding Trusted Applications will be explained. Finally, the step-by-step process of a true end-to-end secure boot process will be detailed.
Learn about:
Speakers:
Mike Hendrick |
Larry O'Connell |
Module: 2 of 4
Duration: 15 minutes
Available On Demand
For many IoT Device vendors, Artificial Intelligence (AI) or Machine Learning (ML) algorithms are business critical and cannot be compromised. Theft of this kind of intellectual property can create long-term damage to a company's revenue and brand. This module will explain how to design a device with secure applications and data that can be protected throughout the supply chain.
Learn about:
Speakers:
Mike Hendrick |
Larry O'Connell |
Module: 3 of 4
Duration: 21 minutes
Available On Demand
To ensure that a device is running at peak performance throughout its lifecycle, firmware updates, administered locally over remotely Over-the-Air (OTA), are essential. In the event of a failure or threat, a device must also be able to quickly recover to a previous safe state. Both of these processes can leave a device particularly vulnerable to attacks if not administered properly. This module covers best practices for device firmware updates and recovery.
Learn how to:
Speakers:
Mike Hendrick |
Larry O'Connell |
Module 4 of 4
Duration: 19 minutes
Available On Demand
Today's applications processors can deliver a rich array of information regarding the health and safety of an IoT Device. Devices can be managed and monitored at scale using cloud services, and the cloud also enables device vendors to monitor threat events and address them. This module covers the concepts for secure device integration with the cloud to enable these services.
Learn about:
Speakers:
Mike Hendrick |
Larry O'Connell |