Loading...

How to Bring SECURE Products to Market Quickly with Sequitur Labs and Variscite

Hosted By Variscite

If you know that security is a critical need for any smart device – and you need a solution that’s robust and easy to implement - don’t miss this webinar.

Billions of devices are expected to be online in the next few years, but about half of IoT vendors have experienced a security breach at least once. Compromised security can hurt your brand and result in lost revenues and customer trust. This problem is getting more serious with the deployment of AI models at the network edge.

Edge device developers need to be assured that their products are designed, manufactured and deployed without risk of being compromised.

Implementing IoT security is, however, a big challenge. It requires understanding a variety of new features and functions and investment in implementing security in a diverse, fragmented microprocessor market. As a result, IoT device vendors need a partner who can deliver a solution that allows them to easily implement security features and functions, and focus their investment and energy on delivering great IoT products and solutions.

The combination of Variscite’s capability to consistently deliver high-quality hardware and software solutions with SecEdge’s complete chip-to-cloud solution solves the complex security problems for edge devices.

This webinar will cover:

  • Variscite’s introduction
  • About the i.MX 8M Plus platform
  • Device Security basics: ARM Trustzone, Secure Enclaves, Secure Boot, Failure Recovery and Secure Product Updates
  • Chip-to-Cloud integration: mutual authentication and secure device registration
  • Cloud-supported device updates, management and protection
  • Methods for protecting intellectual property – in particular, AI models – at the network edge
  • Implementing robust security with the SecEdge's EmSPARK™ Security Suite and Variscite i.MX 8M Plus System on Modules

Speakers:

Itay Silber
Sales Director
Variscite

Larry O'Connell
Vice President, Marketing
SecEdge, Inc.

Mike Hendrick
VP Engineering
SecEdge Inc.

Secure the Edge: Is Your Update Process Secure? Best Practices for Local or Over-the-Air Firmware and File System Updates

Hosted By NXP

With over 75 billion devices expected to be online within 5 years, IoT security is more important than ever. Device security is, however, a big challenge, with nearly half of vendors having experienced an IoT breach at least once. One of the most critical areas of vulnerability is the device firmware and file system update process.

To ensure that a device is running at peak performance throughout its lifecycle, firmware updates, administered locally via a network, or Over-the-Air (OTA), are essential. It is during the update process when the device is most vulnerable to compromise, and a secure process is critical.

This webinar, in partnership with Sequitur Labs, will demystify the best practices for managing a safe and secure firmware update process and how to implement them.

Speakers:

Asim Zaidi
Technical Director, Security for Edge Processing
NXP Semiconductors

Larry O'Connell
Vice President, Marketing
SecEdge. Inc.

Securing Smart Devices: Protecting AI Models at the Edge

Hosted By Edge AI + Vision Alliance

Billions of new IoT devices are expected to come online in just the next few years. Securing these devices is an area of significant concern - to date, about half of IoT vendors have experienced a security breach at least once. IoT vendors need to be assured that their products are designed, manufactured and deployed without risk of being compromised. And the problem is becoming even more serious with the deployment of AI models at the network edge.

Implementing IoT security, is, however, a big challenge. It requires understanding a variety of new features and functions, a steep learning curve in learning how to implement these features using the silicon of choice, and an investment in mastering a diverse, fragmented microprocessor market, since each microprocessor vendors implements security differently. As a result, IoT vendors can greatly benefit from solutions that allow them to easily implement security features and functions, enabling them to focus their investment and energy on delivering great IoT products.

This webinar will cover best practices for securing smart devices at the edge, including a number of methods for protecting AI models. The webinar will include real-life case studies and demonstrations of the concepts discussed. A question-and-answer session will follow the presentation.

Speakers:

Phil Attfield
CEO
SecEdge, Inc.

Larry O'Connell
Vice President, Marketing
SecEdge, Inc.

Mike Hendrick
VP Engineering
SecEdge, Inc.

A.I. Day Assemble All of the Pieces Needed for AI at the Edge of the IoT

Hosted By Open Systems Media

AI platforms at the Edge that are capable of running AI algorithms may look like your basic IoT Edge server, but that is not the case. There’s actually a fair amount of fine tuning that takes place, both in terms of hardware and software to enable this compute-intensive technology. It could be adding to the compute capabilities, ensuring that the system can handle the environments of industrial, medical and/or rugged application, or deploying the appropriate software. In this session, we will look at what’s required to run the deep-learning and machine-learning algorithms that are needed to run your connected AI application. In most cases, that means running advanced analytics to employ real-time decision making.

In this webinar, you'll learn:

  • What’s required to run the deep-learning
  • Machine-learning algorithms that are needed to run your connected AI application
  • Running advanced analytics to employ real-time decision making
  • How to protect AI/ML models at the network edge with the EmSPARK™ Security Suite

Speakers:

Manny Singh
Principal Product Manager
Renesas

Phil Attfield
CTO
SecEdge, Inc.

Dustin Seetoo
Director Product Marketing
Premio Inc.

Evelyn Tsai
Deputy Manager of Sales & Marketing
Wincomm Corporation

Kev Wang
Product Manager
Vecow Co., Ltd.

Joseph Huang
Sales Director
Vecow Co., Ltd.

Protecting AI at the Edge with the EmSPARK Security Suite

Hosted By NVIDIA

Today, IoT device security is simply no longer an option. Inadequate security can lead to deployment failures, theft of intellectual property, loss of revenue, and damage to a vendor’s brand. With the accelerated deployment of artificial intelligence (AI) and machine learning (ML) models at the network edge, device security is more critical than ever.

However, implementing security at the device level is a difficult task for any development team, requiring a deep understanding of silicon, cryptography, and application design. This webinar will de-mystify what IoT security means and how to implement it on the NVIDIA® Jetson™ platform by covering the critical elements of secure device design, manufacturing, and lifecycle management.

If you or your customer are concerned about ensuring that your products are designed to be protected from threats, safe installation and maintenance of your IP (ex. AI/ML algorithms) during manufacturing and product updates, and protecting your IP throughout your product’s lifecycle, this webinar is critical

In this webinar, you'll learn how:

  • Critical elements of a trusted device
  • How to design, build, and maintain a secure device
  • How to protect AI/ML models at the network edge with the EmSPARK™ Security Suite

Speakers:

Larry O'Connell
Vice President, Marketing
SecEdge, Inc.

Mike Hendrick
VP Engineering
SecEdge, Inc.

Solving Data Management & Security from the Device to the Cloud

Do you worry about how to secure IoT device data? Are you ready to leverage proven data management and security solutions to build competitive edge distributed systems? Device developers need to ensure their products are protected from attacks, safe and secure through the manufacturing process, and able to be managed securely throughout the life of the product. Without the appropriate implementation of IoT Security, vendors could risk damage to their products, credibility and brand, as well as the loss of critical intellectual property. We will demonstrate a solution platform that empowers IoT device applications to efficiently extract the valuable data from smart sensors and intelligent devices.

In this webinar, you'll learn how to:

  • Collect, process, manage and distribute sensor data with a high performance database
  • Secure on-board device data management
  • Understand key elements of a Trusted devices
  • Process and stream edge data with SQL for device data management

Speakers:

Alex Dopplinger
Director Product Marketing
NXP Semiconductors

Larry O'Connell
Vice President, Marketing
SecEdge, Inc.

Sasan Montaseri
Founder & President
ITTIA

Ryan Phillips
Chief Architect
ITTIA

Surviving the IoT Wave: How to Optimize Embedded Security

IoT Device Security is simply not optional anymore, but it's a large undertaking for any development team. It requires a deep understanding of security, cryptography, memory architecture, silicon, operating systems and application design. Confronted by this new challenge, IoT device vendors still need to deliver great products on time, using the resources they currently have.

This webinar will demystify what IoT security means and how to implement it, by explaining the critical elements of secure device design, manufacturing, and lifecycle management.

Attendees will also learn about:

  • Understanding Arm TrustZone®, Trusted Execution Environments, and Elements of Secure Boot
  • Protecting Critical Intellectual Property (AI / ML Algorithms)
  • Device Failure Recovery
  • Secure Software Provisioning in Manufacturing and the Supply Chain
  • Integrating Devices and Security Metrics with Cloud Applications

Speakers:

Larry O'Connell
Vice President, Marketing
SecEdge, Inc.

Mike Hendrick
VP Engineering
SecEdge,Inc.

ARROW ELECTRONICS Achieving Platform Resiliency with Shield96, EmSPARK™ and AWS IoT Device Defender

**Requires Registration**

A successful attack on platform firmware could render a system inoperable resulting in significant disruptions to users and business processes. This webinar will demonstrate how the Shield96 Trusted platform hardware, SecEdge’s EmSPARK Security Suite software and AWS Device Defender service can help you achieve platform resiliency components needed to boot and operate a system securely.

Attendees will also learn about:

  • Secure Boot Process
  • Runtime protection
  • Recovery process
  • Secure Update Process
  • Anti-Cloning and Privacy Protection
  • Supply Chain Security
  • NIST 800-193 recommendations for platform resiliency
  • Critical software and hardware elements required to achieve platform resiliency
  • The role of Cloud platforms in managing device resiliency

Speakers:

Janus Piwek
Market Development Engineer EMEA
Arrow Electronics

Mike Hendrick
VP Engineering
SecEdge, Inc.

LEARN MORE ABOUT SECeDGE.

Loading...