Special Offer: Get 50% off your first 2 months when you do one of the following
Personalized offer codes will be given in each session

Unlocking Hardware Security Through Software

About This Webinar

Forty-two percent of organizations that invest in stronger security measures report expedited digital transformation (Dell Technologies, 2019).

As the number of embedded systems at the intelligent edge proliferates, so do security threats. Every connected device, machine, or node represents a new attack surface. One way to address this is to fully leverage the secure capabilities already built into processors. Security features in the different hardware architectures vary widely and can only be unlocked with software.

Join us to examine three primary processor architectures — NXP PPC, Intel , and Xilinx ARM — and the available hardware-based security features each includes, including their advantages and restrictions.

What you will learn:

- Built-in security features for each processor architecture

- Augmentation needed from software-based security features

- The impact of FIPS 140-2 certification needs and quantum computing

- Security features including secure boot, trusted boot, cryptographic processor algorithms, attestation, random number generation, secure key storage, physical tamper monitoring, and JTAG protection

Who can view: Everyone
Webinar Price: Free
Featured Presenters
Hosted By
Access Intelligence, LLC webinar platform hosts Unlocking Hardware Security Through Software
SATELLITE Webinars's webinars
Recommended