Demystifying Industrial Security
|
|
- Katrina Marsh
- 6 years ago
- Views:
Transcription
1 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 1 Demystifying Industrial Security CodeMeter Security with integrated Industrial Flash Memory Oliver Winzenried CEO WIBU-SYSTEMS AG oliver.winzenried@wibu.com
2 Connected World October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 2
3 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 3 Changes in IoT and Industrie 4.0, Today Tomorrow Stand-Alone Devices Fixed Features One-Time Business Product, Upgrades, Service, Spare parts/consumables, replacement Only Repair / Maintenance Individual Hardware Connected Devices Upgradable Features (App Store) Recurring Revenues Pay-Per-Use, Pre-Paid, Post-Paid New Business Models Shorter Time-to-Market, Cloud Standard Platforms (HW & SW)
4 Challenges October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 4
5 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 5 Security versus Safety Safety Protection of humans or environment against risks that come from a (known) technical system IT Security Protection of a technical system against attacks (unknown) and disruption caused by environment or humans Human / Environment Human / Environment Technical System Technical System
6 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 6 Challenge: Security Threats Today Manipulation & Tampering Espionage: Industrial and NSA, Prism, Tempora, Cyber-Attacks: Stuxnet, Duqu, Flame, (German TV, January 2015)
7 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 7 Challenge: Piracy Problem Latest Studies German Engineering Federation (VDMA) 2014: 7.9 Billion piracy losses 9 of 10 companies affected 71% affected by piracy 51% affected by counterfeiting of complete machines No: 29% Yes: 71% 50% 66% 67% 68% Is your company affected by product or brand piracy? 67% 71% 62% JMF-Study: Japan losses 1.8 times higher BSA-Study: Losses 63 Billion US$, globally 42% N=337
8 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 8 Opportunities Licensing: License Models Business Models License Management License Deployment Protection against: IP Theft Hacking Tampering
9 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 9 Why CodeMeter with Flash Memory? Security and memory in ONE Device Retrofitting in Brownfield Cost, Space, Power, benefits Highest Reliability & Quality Excellent components and Partnerships:
10 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 10 Solutions Working Principles Wibu-Systems Solutions & Process Products & Use Cases
11 Technical Solutions Know-how Protection -> using data and program code encryption IP in software, source code, algorithms IP in embedded systems, PLCs, devices, IoT, data, documents, Software and Product Protection -> encryption & unclonable crypto keys Counterfeiting reduction, prevention of unauthorized use (active and passive) Flexible Licensing -> using encryption and business process integration New business models simplify logistics and monetize software Tamper Protection -> using digital signature Prevention of manipulation Cyber-Security IoT, Industrie 4.0 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 11
12 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 12 Requirements in Industrial Applications Highest Security for IP and tamper protection: Users are not the attackers but organized crime, terrorism, competition Use of secure elements for industrial interfaces and environments Flexible Storage for multiple licenses Multiple (device) options and features Different stake holders and rights owners, i.e. automation or machine supplier, user Communication Security: Cyber Security Certificates for OPC UA Retrofitting
13 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 13 Wibu-Systems Technologies and Solutions CodeMeter Secure Key Storage (Hardware / Software) De-/Encryption (AES, ECC, RSA) Flexible License Models Software Integration Automatic Code Protection / API Secure Boot / OPC UA Back Office Integration Key and certificate deployment License deployment License administration Protection Suite: Ax/Ex/Ix-Protector Software Integration Back Office Integration CodeMeter License Central
14 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 14 Integrate Once Deliver Many Integrate Once Deliver Many Integration into software Delivery to the user Software CodeMeter Protection Suite Software CodeMeter License Central Integration into processes L L L L ERP/CRM e-commerce CodeMeter License Central Software License Portal
15 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 15 CmDongle: Storage for Licenses and Keys with highest Security CmCards and CmSticks using: CC EAL 4+/5+ certified security controller CC EAL 4+/5+ certified crypto libraries Extended temperature option Market proven CodeMeter firmware Combination with flash memory Hyperstone flash memory controller (S6/8, F4, A2) Fixed BOM, PCN, long term availability Swissbit Qualification and Production
16 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 16 CmDongle: Combination of CodeMeter Security and flash memory disk CmCards and CmStick/M open up new use cases: Mobile applications (service, forensic, tax, education, industrial, ) Delivery media for large data (maps, service documents, databases, ) Secure storage of log data Use of CmStick/M with HID (no MSD, no BadUSB risk) Secure Boot of embedded systems, PLCs, IoT applications Retrofitting in brownfield Customization: data duplication, key management, OEM label and package,
17 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 17 CmDongle Highest Security Level with integrated Smart Card Chip CmStick/M Industrial and Commercial CdRom, CmPublic, CmPrivate, CmSecure Supports HID communication (CmSecure) Encrypted storage, secure update (no BadUSB risk) CmStick/MI x-2xx -> Industrial 128 MB 8 GB SLC flash memory, -40 C +85 C CmStick/MC x-4xx -> Commercial 8 GB 64 GB high-end 2-Bit-eMMC flash memory
18 Security with Industrial Flash compared with consumer products October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 18
19 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 19 Applications Banking & Retail Medical & IoT Industrial Automation and CPS
20 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 20 Banking and Retail: Wincor-Nixdorf Introduction 2009 CrypTA-User worldwide Central administration and helpdesk using Global Customer Care Center Fulfills requirements from PCI DSS Increase of service efficiency through standardized processes
21 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 21 Mobile Forensic Software: Guidance Guidance Mobile Applications Secure Logging Multi-partition
22 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 22 Medical (customed, Sirona, ) Anti Counterfeiting Licensing Pay Per Use Tamper Protection (FDA, MPG)
23 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 23 Gaming Features: Secure Boot from CmCard/CF IP Protection for game software Tamper Protection for configuration
24 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 24 CODESYS Industrial Automation Boot Project Protection CodeMeter API Source Code Protection Bernecker + Rainer Technology Guard Rockwell Source Protection CSPP
25 : More than 25 years in Business WIBU-SYSTEMS AG Founded in 1989 By Oliver Winzenried and Marcellus Buchheit Headquarters in Germany (Karlsruhe) Focus on Protection, Licensing and Security Technological leader with international patents ISO 9001:2008 certified WIBU-SYSTEMS worldwide Subsidiaries in Seattle, USA Shanghai and Beijing, China Belgium France Ireland Netherlands Portugal Spain UK Exclusive distribution partners in Japan Korea Russia and many more countries Top 2 vendor in hardware-based protection Top 3 vendor in software licensing Global Awards October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 25
26 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" : Cooperations and Memberships Developer Programs R&D Projects Organizations Standardization
27 : Customers and Partners October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 27
28 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 28 Summary: CodeMeter & Flash Memory in One Device is perfect for IoT-Devices, Cyber Physical Systems & Embedded Systems space, power and component saving for minimal Total Cost of Ownership reliable and long-term available fitting for the use in the brownfield optimal for tampering protection and IP protection of software and data ideal for the implementation of new business models
29 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 29 Thank you! Questions? Next Steps? Contact us Deutschland: USA: China: info@wibu.com
CodeMeter in Virtual Environments
in Virtual Environments Rüdiger Kügler, Professional Services Security Expert, WIBU-SYSTEMS AG www.wibu.com Content Introduction 3 The Threats and Challenges of Virtual Machines 4 Threats and Challenges
More informationCodeMeter Technology
CodeMeter Technology Software Protection & Licensing CODESYS Webinar 15 October 2013 Oliver Winzenried CEO oliver.winzenried@wibu.com Page 1 The whole Process Page 2 From a Vendor s View CODEMETER TECHNOLOGY
More informationCardOS Secure Elements for Smart Home Applications
Infineon Security Partner Network Partner Use Case CardOS Secure Elements for Smart Home Applications Using cryptographic functionality provided by ATOS to secure embedded platforms in Smart Home applications.
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationInstructions for Switching from MSD to HID (Windows, Mac & Linux)
Instructions for Switching from MSD to HID (Windows, Mac & Linux) John Poulson, Wibu-Systems USA, 2013 April 22 MSD = Mass Storage Device, like any detachable memory drive attached to a USB port. HID =
More informationConquering Complexity: Addressing Security Challenges of the Connected Vehicle
Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationENABLING HARDWARE SECURITY FOR THE INTERNET OF THINGS
ENABLING HARDWARE SECURITY FOR THE INTERNET OF THINGS SAFE HARBOR NASDAQ: DAIO The matters that we discuss today will include forwardlooking statements that involve risks factors that could cause Data
More informationUtimaco Portfolio Overview Hardware Security Products and Services
Utimaco Portfolio Overview Hardware Security Products and Services About Utimaco Your Root of Trust Utimaco is a leading manufacturer of Hardware Security Modules (HSMs) that provide the Root of Trust
More informationEBV Personalization Services for Security Devices
Infineon Security Partner Network Partner Use Case EBV Personalization Services for Security Devices Secured generation and storage of personalized OEM certificates in the OPTIGA Trust E for sophisticated
More informationData Loss Prevention - Global Market Outlook ( )
Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report
More informationThe Open Application Platform for Secure Elements.
The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java
More informationFB48793: The recreated update files for License Transfer were not identical to the original update file.
Page: 1 of 10 CodeMeter Firmware 4.01 1001-03-xxx 1011-03-xxx 1040-03-xxx 1043-03-xxx 2017-April-27 FB48793: The recreated update files for License Transfer were not identical to the original update file.
More informationSecuring IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region
Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and
More informationDATACARD PB6500 PASSPORT ISSUANCE SYSTEM ADVANCED TECHNOLOGY FOR HIGH-SECURITY PASSPORTS
DATACARD PB6500 PASSPORT ISSUANCE SYSTEM ADVANCED TECHNOLOGY FOR HIGH-SECURITY PASSPORTS A TRUSTED SOLUTIONS PROVIDER FOR GOVERNMENT Governments rely on Datacard Group to develop and deliver sophisticated
More informationMotorola offers smartphone customers value-added services powered by B2X
Motorola offers smartphone customers value-added services powered by B2X In the mobile phone pioneer s new web portal, customers have access to attractive service offerings such as extended service plans,
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationINTERNET OF THINGS KONTRON
INTERNET OF THINGS SECURITY @ KONTRON EMBEDDED COMPUTING CONFERENCE 2017 ECC WINTERTHUR SEPTEMBER 5 TH, 2017 AGENDA 01 INTRODUCTION 02 SECURITY LAYERS 03 KONTRON & S&T // 2 WHAT IS IN IT FOR YOU THROUGH
More informationDigital Forensics - Global Market Outlook ( )
Report Information More information from: https://www.wiseguyreports.com/reports/456593-digital-forensics-global-market-outlook-2015-2022 Digital Forensics - Global Market Outlook (2015-2022) Report /
More informationABOUT COMODO. Year Established: 1998 Ownership: Private Employees: over 700
ABOUT COMODO Comodo is Creating Trust Online because none of us can realize the full potential of the Internet unless it s a trusted place to interact and conduct business. Year Established: 1998 Ownership:
More informationInnovative Fastening Technologies
Innovative Fastening Technologies Corporate Overview 2011 Update Infastech is one of the world s largest producers of engineered mechanical fasteners with revenues exceeding USD500 million and an industry
More informationconverged agile practical Design Your Security We build tailored, converged security for you.
converged Technology. Strategy. People. The synergetic collaboration. agile Design Your Security Hackers sleep - we don t. We re ready whenever, wherever. We build tailored, converged security for you.
More informationMOBILE FORENSICS AND SECURITY
DHS S&T CYBER SECURITY DIVISION 2014 Cyber Security Division R&D Showcase MOBILE FORENSICS AND SECURITY NowSecure Andrew Hoog December 16, 2014 Mobile Devices Are Complicated Average Android Device 300
More informationUtimaco HSM Introduction JIPDEC Seminar June 2017
Utimaco HSM Introduction JIPDEC Seminar June 2017 Joerg Horn Director Business Development Utimaco HSM Business Unit Aachen, Germany 2016 hsm.utimaco.com Page 1 Part 1 Introduction Utimaco History HSM
More informationUNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY OUR MISSION Provide cybersecurity and data protection for organizations,
More informationIndex. Multiple languages / countries Platform DST
Multiple languages / countries Platform DST Date: 01-11-2017 For: Partners DST By: Gijs Hoff / e-business company Recently the project multilingualism has been released to the DST platform. The DST platform
More informationSpotlight on IoT Security. Choose the right security for the Internet of Things.
Spotlight on IoT Security Choose the right security for the Internet of Things www.infineon.com/iot-security Rising concerns about IoT Security With trends such as the Internet of Things (IoT) and machine-to-machine
More informationAtmel Trusted Platform Module June, 2014
Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four
More informationTrends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk
Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk Standards Certification Education & Training Publishing Conferences & Exhibits Steve Liebrecht W/WW Industry
More informationTECHNOLOGY UPDATE STOCKHOLM, NOVEMBER
TECHNOLOGY UPDATE STOCKHOLM, NOVEMBER 1 2017 Disclaimer FORWARD-LOOKING STATEMENTS The presentation contains forward-looking statements with words such as believes, anticipates, outlook, confident, meeting
More informationEmbedded solutions. Embed an Anybus product into your device to connect to any fieldbus or industrial Ethernet network.
Embedded solutions Embed an Anybus product into your device to connect to any fieldbus or industrial network. Anybus: One solution for all networks! How can I connect my products to all networks on the
More informationCerticom Security for Government Suppliers developing products to meet the US Government FIPS security requirement
certicom application notes Certicom Security for Government Suppliers developing products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage of the lucrative
More informationNEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE FROM PROOF-OF-CONCEPT TO START-OF-PRODUCTION
DRIVING CONNECTED NEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE VNC Automotive deliver ingenious connectivity and telematics middleware for the vehicles of tomorrow. Our solutions enable
More informationChiffry. Secure smartphone communication Statustext eingeben. Chiffry-Zertifikat: Chiffry-Zertifikat: Statustext eingeben
Chiffry Secure smartphone communication 09:41 Profil +49124148155122 Statustext eingeben Chiffry-Zertifikat: Profil Einladen Chats Gruppe Einstellungen Profil Einladen Chats Gruppe Einstellungen Chiffry-Zertifikat:
More informationHARDWARE SECURITY MODULES (HSMs)
HARDWARE SECURITY MODULES (HSMs) Cryptography: The basics Protection of data by using keys based on complex, randomly-generated, unique numbers Data is processed by using standard algorithms (mathematical
More informationVMware Technology Overview. Leverage Nextiva Video Management Solution with VMware Virtualization Technology
VMware Technology Overview Leverage Nextiva Video Management Solution with VMware Virtualization Technology Table of Contents Overview... 2 Seamless Integration within the IT Infrastructure... 2 Support
More informationMobile App Development Market Research Report- Global Forecast to 2022
Report Information More information from: https://www.marketresearchfuture.com/reports/1752 Mobile App Development Market Research Report- Global Forecast to 2022 Report / Search Code: MRFR/ICT/1220-HCRR
More informationNew Machine Control Technology:
New Machine Control Technology: Doing More With Less. Joe Martin Packaging Sales Manager Beckhoff Automation j.martin@beckhoff.com www.beckhoffautomation.com The Evolution of Technolgy is Normal. Learn
More informationSECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust
SECURING THE DIGITAL ECONOMY Reinventing the Internet for Trust The Internet Just Can t Keep Up Companies Are Increasingly Dependent on the Internet for Business Growth 90% 76% 18% 35% to rank business
More informationNCC Group plc. NCC Group plc Interim Results
NCC Group plc Interim Results for the six months ended 30 November 2007 NCC Group plc Manchester Technology Centre Oxford Road Manchester M1 7EF www.nccgroup.com January 2008 Agenda Highlights Acquisition
More informationConnected & Autonomous vehicles
Connected & Autonomous vehicles AVL conference November 2016 Jonas Wilhelmsson Global Sales Director Ericsson Commercial in Confidence 2016-11-22 Page 1 3 major revolutions... Ericsson Commercial in Confidence
More informationitelligence Your One-Stop Partner
itelligence Your One-Stop Partner Table of Contents 3 itelligence in Numbers 4 itelligence Germany in Numbers 5 A Closer Look at the Market 6 Milestones in the itelligence History 7 Integrated Approach
More informationIntel and Symantec: Improving performance, security, manageability and data protection
Intel and Symantec: Improving performance, security, manageability and data protection Terry Cutler Enterprise Solution Architect Omid Meshkin Strategic Business Development 1 Session Objectives By the
More informationInternet of Things real life cases Alex Ahlberg
Internet of Things real life cases Alex Ahlberg Sales Manager, Symantec Finland & Baltics Symantec At a Glance 175M endpoints under protection $4.6B annual revenue 2123 patents 385,000 customers worldwide
More informationMoser Baer Group 25 years of excellence
Moser Baer Group 25 years of excellence Introduction to the Moser Baer Group Established in 1983 25 years legacy as India s leading technology manufacturing company 8,000 Employees Rs11,000 Crores in Assets
More informationOverview of PBI-blockchain cooperation technology
FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview
More informationARM mbed mbed OS mbed Cloud
ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics
More informationNFC embedded microsd smart Card - Mobile ticketing opportunities in Transit
NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit July 2017 By: www.smk-logomotion.com Introduction Presentation is describing NFC enabled microsd smart card (LGM Card) Technical
More informationSmart Grid Maturity Model
Smart Grid Maturity Model Austin Montgomery Software Engineering Institute Carnegie Mellon University Software Engineering Institute Carnegie Mellon University 2 SEI is a federally-funded research and
More informationProduct info. PCKeeper - Ver Windows 10. PCKeeper Antivirus - Ver Windows 10. BRATISLAVA, Slovakia, Sept 2, 2016
Essentware S.A. the official owner of PCKeeper brand informs it s users that both of company products have successfully passed the Windows 10 compatibility qualification. PCKeeper Live and PCKeeper Antivirus
More informationNETWORK SECURITY STORMSHIELD. Unified Threat Management Solutions and Next- Generation Firewalls
NETWORK SECURITY STORMSHIELD NETWORK SECURITY Unified Threat Management Solutions and Next- Generation Firewalls Our Mission Make the digital world a sustainable and trustworthy environment while ensuring
More informationServer side management system for multiple IoT terminals in industrial systems
Infineon Network Use Case Server side management system for multiple IoT terminals in industrial systems This system utilizes the technology of the Trusted Computing Group (TCG) as a time-to-market solution
More informationQLogic 2500 Series FC HBAs Accelerate Application Performance
QLogic 2500 Series FC HBAs Accelerate QLogic 8Gb Fibre Channel Adapters from Cavium: Planning for Future Requirements 8Gb Performance Meets the Needs of Next-generation Data Centers EXECUTIVE SUMMARY It
More informationCybersecurity with Automated Certificate and Password Management for Surveillance
Cybersecurity with Automated Certificate and Password Management for Surveillance October 2017 ABSTRACT This reference architecture guide describes the reference architecture of a validated solution to
More informationAgilent E4982A LCR Meter
Agilent E4982A LCR Meter 1 MHz to 3 GHz Configuration Guide Ordering guide The following steps will guide you through configuring your E4982A. Standard furnished item Description Test head with 1m test
More informationSecuring IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager
Securing IoT devices with Hardware Secure Element Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager 2 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris
More informationThe Little Fuchsia Book of HPE Data Center Solutions
The Little Fuchsia Book of HPE Data Center Solutions Introduction The data center has become a core focus of the digital economy. It s always been an important, though quiet, IT function, operating behind
More informationScalable Security solutions to enable Cyber Security and to manage Digital Identities
Scalable Security solutions to enable Cyber Security and to manage Digital Identities It s all about managing identities GIC@CeBIT 2017 International Cyber Security Conference Axel Deininger 20.03.2017
More informationA C H I E V E B O T H W I T H K E Y S I G H T. Company Profile
A C H I E V E B O T H W I T H K E Y S I G H T 1 W E H E L P Y O U C R E AT E. I N N O VAT E. A N D D E L I V E R W H AT S N E X T. The innovation leader in electronic design and test for over 75 years
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationWorldwide Mobile Imaging: Stimulating Demand and Usage
December 2005 Multi-Client Worldwide Mobile Imaging: Stimulating Demand and Usage Authors Jeff Hayes Jill Aldort Published by Market Research Project Objectives This study is designed to help digital camera
More information$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales
WHITE PAPER Flexible Key Provisioning with SRAM PUF SRAM PUF Benefits Uses standard SRAM Device-unique keys No secrets reside on the chip No key material programmed Flexible and scalable Certifications:
More informationIDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller
IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart
More informationDrive your future with Hammer
Drive your future with Hammer No.1 supplier for HDD and SSD Drive your future with Hammer >16 million drives sold Hammer is a leading storage distributor with 25 years experience. Combining flexibility
More informationSIMATIC. Industrial PC Microsoft Windows 7. Safety instructions 1. Initial startup: Commissioning the operating. system
Safety instructions 1 Initial startup: Commissioning the operating 2 system SIMATIC Industrial PC Operating Instructions Restoring the factory settings of the operating system and 3 partitions (Restore)
More informationMaking 5G Real. Ericsson Internal Guilherme Alves Ericsson
Making 5G Real Guilherme Alves Ericsson 2018-05-17 Agenda The ecosystem Technologies at the heart of 5G Consumer interest levels Low Average High Consumers: Give us more with 5G! Higher performance is
More informationDate: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc.
Date: 13 June 2018 @qualcomm Location: Sophia Antipolis Integrating the SIM Dr. Adrian Escott Qualcomm Technologies, Inc. Agenda 1 2 3 4 5 6 Path to isim isim Size benefit Hardware Architecture Certification
More informationCyber Security: It s all about TRUST
www.pwc.com/vn Cyber Security: It s all about TRUST 29 th March 2017 Robert Tran Cybersecurity leader, Vietnam Content s Digital IQ Survey 1 Current state of Cybersecurity in Vietnam 2 2 Our global team
More informationCYBERSMART BUILDINGS. Securing Your Investments in Connectivity and Automation
CYBERSMART BUILDINGS Securing Your Investments in Connectivity and Automation JANUARY 2018 WELCOME STEVE BRUKBACHER Application Security Manager Global Product Security Johnson Controls 1 WHY ARE WE HERE
More informationTAGITM Winter Summit 2017 Evaluating All Flash Storage for the Enterprise
TAGITM Winter Summit 2017 Evaluating All Flash Storage for the Enterprise Presented by: John Barnard Field Solutions Manager, SHI Enterprise Solutions Group Topics Four things you should know about flash
More informationARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO
ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing Pierre Garnier, COO 1 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium
More informationBuilding a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017
Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017 Trust is vital and it s what we provide enabling our clients to deliver
More informationWatchGuardONE Channel Program
WatchGuardONE Channel Program Powerful Reasons to Join TeamRED 100% Channel Focused As a 100% channel-focused organization, we are dedicated to your success. You are our sales team, and if you don t sell
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationCybersmart Buildings: Securing Your Investments in Connectivity and Automation
Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Jason Rosselot, CISSP, Director Product Cyber Security, Johnson Controls AIA Quality Assurance The Building Commissioning
More informationThe European Company that protects the world
Limitless Visibility, Absolute Control The European Company that protects the world pandasecurity.com/business/ Generating Trust and Making Us Stand Out Over the last few years, Panda Security has designed
More informationFACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008
FACTS AND OPPORTUNITIES IN BRAZIL Gartner IT Security Summit Washington DC, June 2008 OUR OBJECTIVE TODAY Raise your awareness that there are several Brazilian IT Services and Solutions Providers that
More informationSECURITY MODELS FOR APPLICATION PROTECTION AND AGAINST REVERSE ENGINEERING
SECURITY MODELS FOR APPLICATION PROTECTION AND AGAINST REVERSE ENGINEERING SECURITY @ KONTRON PETER MÜLLER, DIRECTOR PRODUCTLINE BOARDS & MODULES TELEREX OCTOBER, 2017 AGENDA 01 02 03 04 TECHNOLOGICAL
More information716 West Ave Austin, TX USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud
More informationCar2Car Forum Operational Security
Car2Car Forum 2012 14.11.2012 Operational Security Stefan Goetz, Continental Hervé Seudié, Bosch Working Group Security Task Force: In-vehicle Security and Trust Assurance Level 15/11/2012 C2C-CC Security
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationBeyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationAdding value to your MS customers
Securing Microsoft Adding value to your MS customers Authentication - Identity Protection Hardware Security Modules DataSecure - Encryption and Control Disc Encryption Offering the broadest range of authentication,
More informationThe Road to Industry 4.0
The Road to Industry 4.0 Secure remote access and active cyber protection for industrial machinery Hamburg, May 22, 2017 Fabian Bahr G+D Group Business Units and Divisions G+D Mobile Security Financial
More informationSmart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security
Smart Meter Security Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Grids: Advanced power control, intelligence and communications New Business models and Services
More informationINNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY
INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY Verisec is a Swedish IT-security company specialized in digital identity and information security solutions for the banking and payments industry.
More informationIn today s business environment, data creates value so it s more important than ever to protect it as a vital business asset
In today s business environment, data creates value so it s more important than ever to protect it as a vital business asset Seagate Secure Reliable Data Protection Solutions Always-on Data Protection
More informationPROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY OUR MISSION Make the digital world a sustainable and trustworthy environment
More informationThe demands placed on commercial vehicles have evolved dramatically over the years. With new
Mobile automation Around 2,000 employees work at the B&R headquarters in Eggelsberg, Austria. Technology leader The innovative spirit that keeps B&R at the forefront of industrial automation is driven
More informationIntelligent Building and Cybersecurity 2016
Intelligent Building and Cybersecurity 2016 Landmark Research Executive Summary 2016, Continental Automated Buildings Association Presentation Contents 1. About CABA, Compass Intelligence & This Research
More informationArchitektura bezpieczeństwa dla otwartych zintegrowanych systemów administracji publicznej
Architektura bezpieczeństwa dla otwartych zintegrowanych systemów administracji publicznej Robert Michalski, Security Tiger Team, Central & Eastern Europe robert.michalski@pl.ibm.com Agenda 1 2 3 Threats
More informationJim Reavis CEO and Founder Cloud Security Alliance December 2017
CLOUD THREAT HUNTING Jim Reavis CEO and Founder Cloud Security Alliance December 2017 A B O U T T H E BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT C L O U D S E C U R I T Y A L L I A N C E GLOBAL,
More informationBRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers
1 BRIDGE TO GLOBAL MARKET FOR MVNOs Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers How to compete with big MNOs on equal terms 2 Your
More informationTHE BEST OF ICT WITH A HUMAN TOUCH
THE BEST OF ICT WITH A HUMAN TOUCH VINCI & VINCI ENERGIES WORLDWIDE PLAYER IN CONCESSIONS & CONSTRUCTION VINCI ENERGIES IS A DIVISION OF VINCI Technology Roads Construction Concessions VINCI VINCI Energies
More informationCambridge TECHNICALS LEVEL 3
Cambridge TECHNICALS LEVEL 3 IT GUIDE Version ocr.org.uk/it CONTENTS Introduction 3 Communication and employability skills for IT 4 2 Information systems 5 3 Computer systems 6 4 Managing networks 7 5
More informationEnabling Smart Lighting for Smart Cities. How Cheen Ng 18 August 2017
Enabling Smart Lighting for Smart Cities How Cheen Ng 18 August 2017 Infineon at a glance Business Segments Automotive 17% (ATV) 31% 41% 11% Revenue FY 2016 Industrial Power Control (IPC) Power Management
More informationmbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017
mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud
More informationEtherCAT and Industrie 4.0 & Industrial Internet of Things
EtherCAT and & Industrial Internet of Things? Oliver Fels Technology Marketing EtherCAT Technology Group ETG Headquarters, Germany 22.09.2016 EtherCAT + & IoT What is?? : the 4 th Industrial Revolution
More information