Loading...

Securing a Connected World - Chip-to-Cloud Security Solutions for the Network Edge

Presented in Spanish / En español.

Duration: 34 minutes 10 seconds

Available On Demand

SecEdge Security Platform overview, including secure boot & updates, threat detection and remediation, and protecting AI at the Edge.  Presented in Spanish / En español.

Speakers:

Julia Narvaez
Director, Product Engineering & Delivery
SecEdge, Inc.

Critical Elements of a Secure Device: Rich and Trusted Environments, Memory Partitioning, Trusted Applications, and End-to-End Secure Boot

Module: 1 of 4

Duration: 19 minutes

Available On Demand

This module covers the fundamentals of device security. First we will describe the concept of a secure enclave (creating partitioned memory for secure environments). Next, the concepts of a Trusted Execution Environment (TEE) and corresponding Trusted Applications will be explained. Finally, the step-by-step process of a true end-to-end secure boot process will be detailed.

Learn about:

  • The most important elements of a secure device.
  • Creating a secure memory enclave using ARM TrustZone
  • How to use a Trusted Execution Environment
  • Understanding and implementing Trusted Applications
  • How to implement a complete secure boot process

Speakers:

Mike Hendrick
VP Engineering
SecEdge, Inc.

Larry O'Connell
Vice President, Marketing
SecEdge, Inc.

Protecting AI at the Edge: Implementing Anti-Piracy Techniques to Secure Critical Intellectual Property

Module: 2 of 4

Duration: 15 minutes

Available On Demand

For many IoT Device vendors, Artificial Intelligence (AI) or Machine Learning (ML) algorithms are business critical and cannot be compromised. Theft of this kind of intellectual property can create long-term damage to a company's revenue and brand. This module will explain how to design a device with secure applications and data that can be protected throughout the supply chain.

Learn about:

  • Using the Secure Enclave to build a secure environment for applications
  • Storing and accessing data in the secure environment
  • How to develop a secure application in the Trusted Execution Environment (TEE)
  • Ensuring Secure Software Provisioning during the Manufacturing Process

Speakers:

Mike Hendrick
VP Engineering
SecEdge, Inc.

Larry O'Connell
Vice President, Marketing
SecEdge, Inc.

Secure Firmware Updates and Device Fault Recovery

Module: 3 of 4

Duration: 21 minutes

Available On Demand

To ensure that a device is running at peak performance throughout its lifecycle, firmware updates, administered locally over remotely Over-the-Air (OTA), are essential. In the event of a failure or threat, a device must also be able to quickly recover to a previous safe state. Both of these processes can leave a device particularly vulnerable to attacks if not administered properly. This module covers best practices for device firmware updates and recovery.

Learn how to:

  • Integrate update and firmware recovery applications in a secure device
  • Protect new or backup firmware as it is being installed during the update and recovery process

Speakers:

Mike Hendrick
VP Engineering
SecEdge, Inc.

Larry O'Connell
Vice President, Marketing
SecEdge, Inc.

Integrating Embedded Device Security with Cloud Services

Module 4 of 4

Duration: 19 minutes

Available On Demand

Today's applications processors can deliver a rich array of information regarding the health and safety of an IoT Device. Devices can be managed and monitored at scale using cloud services, and the cloud also enables device vendors to monitor threat events and address them. This module covers the concepts for secure device integration with the cloud to enable these services.

Learn about:

  • Key elements of Cloud Integration
  • Using MQTT to enable messaging for Cloud Services
  • Monitoring threat events and applying remediation

Speakers:

Mike Hendrick
VP Engineering
SecEdge, Inc.

Larry O'Connell
Vice President, Marketing
SecEdge, Inc.

LEARN MORE ABOUT SECeDGE.

Loading...