Demystifying Industrial Security

Size: px
Start display at page:

Download "Demystifying Industrial Security"

Transcription

1 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 1 Demystifying Industrial Security CodeMeter Security with integrated Industrial Flash Memory Oliver Winzenried CEO WIBU-SYSTEMS AG oliver.winzenried@wibu.com

2 Connected World October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 2

3 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 3 Changes in IoT and Industrie 4.0, Today Tomorrow Stand-Alone Devices Fixed Features One-Time Business Product, Upgrades, Service, Spare parts/consumables, replacement Only Repair / Maintenance Individual Hardware Connected Devices Upgradable Features (App Store) Recurring Revenues Pay-Per-Use, Pre-Paid, Post-Paid New Business Models Shorter Time-to-Market, Cloud Standard Platforms (HW & SW)

4 Challenges October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 4

5 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 5 Security versus Safety Safety Protection of humans or environment against risks that come from a (known) technical system IT Security Protection of a technical system against attacks (unknown) and disruption caused by environment or humans Human / Environment Human / Environment Technical System Technical System

6 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 6 Challenge: Security Threats Today Manipulation & Tampering Espionage: Industrial and NSA, Prism, Tempora, Cyber-Attacks: Stuxnet, Duqu, Flame, (German TV, January 2015)

7 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 7 Challenge: Piracy Problem Latest Studies German Engineering Federation (VDMA) 2014: 7.9 Billion piracy losses 9 of 10 companies affected 71% affected by piracy 51% affected by counterfeiting of complete machines No: 29% Yes: 71% 50% 66% 67% 68% Is your company affected by product or brand piracy? 67% 71% 62% JMF-Study: Japan losses 1.8 times higher BSA-Study: Losses 63 Billion US$, globally 42% N=337

8 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 8 Opportunities Licensing: License Models Business Models License Management License Deployment Protection against: IP Theft Hacking Tampering

9 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 9 Why CodeMeter with Flash Memory? Security and memory in ONE Device Retrofitting in Brownfield Cost, Space, Power, benefits Highest Reliability & Quality Excellent components and Partnerships:

10 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 10 Solutions Working Principles Wibu-Systems Solutions & Process Products & Use Cases

11 Technical Solutions Know-how Protection -> using data and program code encryption IP in software, source code, algorithms IP in embedded systems, PLCs, devices, IoT, data, documents, Software and Product Protection -> encryption & unclonable crypto keys Counterfeiting reduction, prevention of unauthorized use (active and passive) Flexible Licensing -> using encryption and business process integration New business models simplify logistics and monetize software Tamper Protection -> using digital signature Prevention of manipulation Cyber-Security IoT, Industrie 4.0 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 11

12 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 12 Requirements in Industrial Applications Highest Security for IP and tamper protection: Users are not the attackers but organized crime, terrorism, competition Use of secure elements for industrial interfaces and environments Flexible Storage for multiple licenses Multiple (device) options and features Different stake holders and rights owners, i.e. automation or machine supplier, user Communication Security: Cyber Security Certificates for OPC UA Retrofitting

13 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 13 Wibu-Systems Technologies and Solutions CodeMeter Secure Key Storage (Hardware / Software) De-/Encryption (AES, ECC, RSA) Flexible License Models Software Integration Automatic Code Protection / API Secure Boot / OPC UA Back Office Integration Key and certificate deployment License deployment License administration Protection Suite: Ax/Ex/Ix-Protector Software Integration Back Office Integration CodeMeter License Central

14 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 14 Integrate Once Deliver Many Integrate Once Deliver Many Integration into software Delivery to the user Software CodeMeter Protection Suite Software CodeMeter License Central Integration into processes L L L L ERP/CRM e-commerce CodeMeter License Central Software License Portal

15 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 15 CmDongle: Storage for Licenses and Keys with highest Security CmCards and CmSticks using: CC EAL 4+/5+ certified security controller CC EAL 4+/5+ certified crypto libraries Extended temperature option Market proven CodeMeter firmware Combination with flash memory Hyperstone flash memory controller (S6/8, F4, A2) Fixed BOM, PCN, long term availability Swissbit Qualification and Production

16 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 16 CmDongle: Combination of CodeMeter Security and flash memory disk CmCards and CmStick/M open up new use cases: Mobile applications (service, forensic, tax, education, industrial, ) Delivery media for large data (maps, service documents, databases, ) Secure storage of log data Use of CmStick/M with HID (no MSD, no BadUSB risk) Secure Boot of embedded systems, PLCs, IoT applications Retrofitting in brownfield Customization: data duplication, key management, OEM label and package,

17 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 17 CmDongle Highest Security Level with integrated Smart Card Chip CmStick/M Industrial and Commercial CdRom, CmPublic, CmPrivate, CmSecure Supports HID communication (CmSecure) Encrypted storage, secure update (no BadUSB risk) CmStick/MI x-2xx -> Industrial 128 MB 8 GB SLC flash memory, -40 C +85 C CmStick/MC x-4xx -> Commercial 8 GB 64 GB high-end 2-Bit-eMMC flash memory

18 Security with Industrial Flash compared with consumer products October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 18

19 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 19 Applications Banking & Retail Medical & IoT Industrial Automation and CPS

20 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 20 Banking and Retail: Wincor-Nixdorf Introduction 2009 CrypTA-User worldwide Central administration and helpdesk using Global Customer Care Center Fulfills requirements from PCI DSS Increase of service efficiency through standardized processes

21 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 21 Mobile Forensic Software: Guidance Guidance Mobile Applications Secure Logging Multi-partition

22 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 22 Medical (customed, Sirona, ) Anti Counterfeiting Licensing Pay Per Use Tamper Protection (FDA, MPG)

23 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 23 Gaming Features: Secure Boot from CmCard/CF IP Protection for game software Tamper Protection for configuration

24 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 24 CODESYS Industrial Automation Boot Project Protection CodeMeter API Source Code Protection Bernecker + Rainer Technology Guard Rockwell Source Protection CSPP

25 : More than 25 years in Business WIBU-SYSTEMS AG Founded in 1989 By Oliver Winzenried and Marcellus Buchheit Headquarters in Germany (Karlsruhe) Focus on Protection, Licensing and Security Technological leader with international patents ISO 9001:2008 certified WIBU-SYSTEMS worldwide Subsidiaries in Seattle, USA Shanghai and Beijing, China Belgium France Ireland Netherlands Portugal Spain UK Exclusive distribution partners in Japan Korea Russia and many more countries Top 2 vendor in hardware-based protection Top 3 vendor in software licensing Global Awards October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 25

26 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" : Cooperations and Memberships Developer Programs R&D Projects Organizations Standardization

27 : Customers and Partners October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 27

28 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 28 Summary: CodeMeter & Flash Memory in One Device is perfect for IoT-Devices, Cyber Physical Systems & Embedded Systems space, power and component saving for minimal Total Cost of Ownership reliable and long-term available fitting for the use in the brownfield optimal for tampering protection and IP protection of software and data ideal for the implementation of new business models

29 October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 29 Thank you! Questions? Next Steps? Contact us Deutschland: USA: China: info@wibu.com

CodeMeter in Virtual Environments

CodeMeter in Virtual Environments in Virtual Environments Rüdiger Kügler, Professional Services Security Expert, WIBU-SYSTEMS AG www.wibu.com Content Introduction 3 The Threats and Challenges of Virtual Machines 4 Threats and Challenges

More information

CodeMeter Technology

CodeMeter Technology CodeMeter Technology Software Protection & Licensing CODESYS Webinar 15 October 2013 Oliver Winzenried CEO oliver.winzenried@wibu.com Page 1 The whole Process Page 2 From a Vendor s View CODEMETER TECHNOLOGY

More information

CardOS Secure Elements for Smart Home Applications

CardOS Secure Elements for Smart Home Applications Infineon Security Partner Network Partner Use Case CardOS Secure Elements for Smart Home Applications Using cryptographic functionality provided by ATOS to secure embedded platforms in Smart Home applications.

More information

Cyber security mechanisms for connected vehicles

Cyber security mechanisms for connected vehicles Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX

More information

Instructions for Switching from MSD to HID (Windows, Mac & Linux)

Instructions for Switching from MSD to HID (Windows, Mac & Linux) Instructions for Switching from MSD to HID (Windows, Mac & Linux) John Poulson, Wibu-Systems USA, 2013 April 22 MSD = Mass Storage Device, like any detachable memory drive attached to a USB port. HID =

More information

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

ENABLING HARDWARE SECURITY FOR THE INTERNET OF THINGS

ENABLING HARDWARE SECURITY FOR THE INTERNET OF THINGS ENABLING HARDWARE SECURITY FOR THE INTERNET OF THINGS SAFE HARBOR NASDAQ: DAIO The matters that we discuss today will include forwardlooking statements that involve risks factors that could cause Data

More information

Utimaco Portfolio Overview Hardware Security Products and Services

Utimaco Portfolio Overview Hardware Security Products and Services Utimaco Portfolio Overview Hardware Security Products and Services About Utimaco Your Root of Trust Utimaco is a leading manufacturer of Hardware Security Modules (HSMs) that provide the Root of Trust

More information

EBV Personalization Services for Security Devices

EBV Personalization Services for Security Devices Infineon Security Partner Network Partner Use Case EBV Personalization Services for Security Devices Secured generation and storage of personalized OEM certificates in the OPTIGA Trust E for sophisticated

More information

Data Loss Prevention - Global Market Outlook ( )

Data Loss Prevention - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report

More information

The Open Application Platform for Secure Elements.

The Open Application Platform for Secure Elements. The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java

More information

FB48793: The recreated update files for License Transfer were not identical to the original update file.

FB48793: The recreated update files for License Transfer were not identical to the original update file. Page: 1 of 10 CodeMeter Firmware 4.01 1001-03-xxx 1011-03-xxx 1040-03-xxx 1043-03-xxx 2017-April-27 FB48793: The recreated update files for License Transfer were not identical to the original update file.

More information

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and

More information

DATACARD PB6500 PASSPORT ISSUANCE SYSTEM ADVANCED TECHNOLOGY FOR HIGH-SECURITY PASSPORTS

DATACARD PB6500 PASSPORT ISSUANCE SYSTEM ADVANCED TECHNOLOGY FOR HIGH-SECURITY PASSPORTS DATACARD PB6500 PASSPORT ISSUANCE SYSTEM ADVANCED TECHNOLOGY FOR HIGH-SECURITY PASSPORTS A TRUSTED SOLUTIONS PROVIDER FOR GOVERNMENT Governments rely on Datacard Group to develop and deliver sophisticated

More information

Motorola offers smartphone customers value-added services powered by B2X

Motorola offers smartphone customers value-added services powered by B2X Motorola offers smartphone customers value-added services powered by B2X In the mobile phone pioneer s new web portal, customers have access to attractive service offerings such as extended service plans,

More information

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation

More information

Provisioning secure Identity for Microcontroller based IoT Devices

Provisioning secure Identity for Microcontroller based IoT Devices Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May

More information

INTERNET OF THINGS KONTRON

INTERNET OF THINGS KONTRON INTERNET OF THINGS SECURITY @ KONTRON EMBEDDED COMPUTING CONFERENCE 2017 ECC WINTERTHUR SEPTEMBER 5 TH, 2017 AGENDA 01 INTRODUCTION 02 SECURITY LAYERS 03 KONTRON & S&T // 2 WHAT IS IN IT FOR YOU THROUGH

More information

Digital Forensics - Global Market Outlook ( )

Digital Forensics - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/456593-digital-forensics-global-market-outlook-2015-2022 Digital Forensics - Global Market Outlook (2015-2022) Report /

More information

ABOUT COMODO. Year Established: 1998 Ownership: Private Employees: over 700

ABOUT COMODO. Year Established: 1998 Ownership: Private Employees: over 700 ABOUT COMODO Comodo is Creating Trust Online because none of us can realize the full potential of the Internet unless it s a trusted place to interact and conduct business. Year Established: 1998 Ownership:

More information

Innovative Fastening Technologies

Innovative Fastening Technologies Innovative Fastening Technologies Corporate Overview 2011 Update Infastech is one of the world s largest producers of engineered mechanical fasteners with revenues exceeding USD500 million and an industry

More information

converged agile practical Design Your Security We build tailored, converged security for you.

converged agile practical Design Your Security We build tailored, converged security for you. converged Technology. Strategy. People. The synergetic collaboration. agile Design Your Security Hackers sleep - we don t. We re ready whenever, wherever. We build tailored, converged security for you.

More information

MOBILE FORENSICS AND SECURITY

MOBILE FORENSICS AND SECURITY DHS S&T CYBER SECURITY DIVISION 2014 Cyber Security Division R&D Showcase MOBILE FORENSICS AND SECURITY NowSecure Andrew Hoog December 16, 2014 Mobile Devices Are Complicated Average Android Device 300

More information

Utimaco HSM Introduction JIPDEC Seminar June 2017

Utimaco HSM Introduction JIPDEC Seminar June 2017 Utimaco HSM Introduction JIPDEC Seminar June 2017 Joerg Horn Director Business Development Utimaco HSM Business Unit Aachen, Germany 2016 hsm.utimaco.com Page 1 Part 1 Introduction Utimaco History HSM

More information

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY OUR MISSION Provide cybersecurity and data protection for organizations,

More information

Index. Multiple languages / countries Platform DST

Index. Multiple languages / countries Platform DST Multiple languages / countries Platform DST Date: 01-11-2017 For: Partners DST By: Gijs Hoff / e-business company Recently the project multilingualism has been released to the DST platform. The DST platform

More information

Spotlight on IoT Security. Choose the right security for the Internet of Things.

Spotlight on IoT Security. Choose the right security for the Internet of Things. Spotlight on IoT Security Choose the right security for the Internet of Things www.infineon.com/iot-security Rising concerns about IoT Security With trends such as the Internet of Things (IoT) and machine-to-machine

More information

Atmel Trusted Platform Module June, 2014

Atmel Trusted Platform Module June, 2014 Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four

More information

Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk

Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk Standards Certification Education & Training Publishing Conferences & Exhibits Steve Liebrecht W/WW Industry

More information

TECHNOLOGY UPDATE STOCKHOLM, NOVEMBER

TECHNOLOGY UPDATE STOCKHOLM, NOVEMBER TECHNOLOGY UPDATE STOCKHOLM, NOVEMBER 1 2017 Disclaimer FORWARD-LOOKING STATEMENTS The presentation contains forward-looking statements with words such as believes, anticipates, outlook, confident, meeting

More information

Embedded solutions. Embed an Anybus product into your device to connect to any fieldbus or industrial Ethernet network.

Embedded solutions. Embed an Anybus product into your device to connect to any fieldbus or industrial Ethernet network. Embedded solutions Embed an Anybus product into your device to connect to any fieldbus or industrial network. Anybus: One solution for all networks! How can I connect my products to all networks on the

More information

Certicom Security for Government Suppliers developing products to meet the US Government FIPS security requirement

Certicom Security for Government Suppliers developing products to meet the US Government FIPS security requirement certicom application notes Certicom Security for Government Suppliers developing products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage of the lucrative

More information

NEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE FROM PROOF-OF-CONCEPT TO START-OF-PRODUCTION

NEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE FROM PROOF-OF-CONCEPT TO START-OF-PRODUCTION DRIVING CONNECTED NEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE VNC Automotive deliver ingenious connectivity and telematics middleware for the vehicles of tomorrow. Our solutions enable

More information

Chiffry. Secure smartphone communication Statustext eingeben. Chiffry-Zertifikat: Chiffry-Zertifikat: Statustext eingeben

Chiffry. Secure smartphone communication Statustext eingeben. Chiffry-Zertifikat: Chiffry-Zertifikat: Statustext eingeben Chiffry Secure smartphone communication 09:41 Profil +49124148155122 Statustext eingeben Chiffry-Zertifikat: Profil Einladen Chats Gruppe Einstellungen Profil Einladen Chats Gruppe Einstellungen Chiffry-Zertifikat:

More information

HARDWARE SECURITY MODULES (HSMs)

HARDWARE SECURITY MODULES (HSMs) HARDWARE SECURITY MODULES (HSMs) Cryptography: The basics Protection of data by using keys based on complex, randomly-generated, unique numbers Data is processed by using standard algorithms (mathematical

More information

VMware Technology Overview. Leverage Nextiva Video Management Solution with VMware Virtualization Technology

VMware Technology Overview. Leverage Nextiva Video Management Solution with VMware Virtualization Technology VMware Technology Overview Leverage Nextiva Video Management Solution with VMware Virtualization Technology Table of Contents Overview... 2 Seamless Integration within the IT Infrastructure... 2 Support

More information

Mobile App Development Market Research Report- Global Forecast to 2022

Mobile App Development Market Research Report- Global Forecast to 2022 Report Information More information from: https://www.marketresearchfuture.com/reports/1752 Mobile App Development Market Research Report- Global Forecast to 2022 Report / Search Code: MRFR/ICT/1220-HCRR

More information

New Machine Control Technology:

New Machine Control Technology: New Machine Control Technology: Doing More With Less. Joe Martin Packaging Sales Manager Beckhoff Automation j.martin@beckhoff.com www.beckhoffautomation.com The Evolution of Technolgy is Normal. Learn

More information

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust SECURING THE DIGITAL ECONOMY Reinventing the Internet for Trust The Internet Just Can t Keep Up Companies Are Increasingly Dependent on the Internet for Business Growth 90% 76% 18% 35% to rank business

More information

NCC Group plc. NCC Group plc Interim Results

NCC Group plc. NCC Group plc Interim Results NCC Group plc Interim Results for the six months ended 30 November 2007 NCC Group plc Manchester Technology Centre Oxford Road Manchester M1 7EF www.nccgroup.com January 2008 Agenda Highlights Acquisition

More information

Connected & Autonomous vehicles

Connected & Autonomous vehicles Connected & Autonomous vehicles AVL conference November 2016 Jonas Wilhelmsson Global Sales Director Ericsson Commercial in Confidence 2016-11-22 Page 1 3 major revolutions... Ericsson Commercial in Confidence

More information

itelligence Your One-Stop Partner

itelligence Your One-Stop Partner itelligence Your One-Stop Partner Table of Contents 3 itelligence in Numbers 4 itelligence Germany in Numbers 5 A Closer Look at the Market 6 Milestones in the itelligence History 7 Integrated Approach

More information

Intel and Symantec: Improving performance, security, manageability and data protection

Intel and Symantec: Improving performance, security, manageability and data protection Intel and Symantec: Improving performance, security, manageability and data protection Terry Cutler Enterprise Solution Architect Omid Meshkin Strategic Business Development 1 Session Objectives By the

More information

Internet of Things real life cases Alex Ahlberg

Internet of Things real life cases Alex Ahlberg Internet of Things real life cases Alex Ahlberg Sales Manager, Symantec Finland & Baltics Symantec At a Glance 175M endpoints under protection $4.6B annual revenue 2123 patents 385,000 customers worldwide

More information

Moser Baer Group 25 years of excellence

Moser Baer Group 25 years of excellence Moser Baer Group 25 years of excellence Introduction to the Moser Baer Group Established in 1983 25 years legacy as India s leading technology manufacturing company 8,000 Employees Rs11,000 Crores in Assets

More information

Overview of PBI-blockchain cooperation technology

Overview of PBI-blockchain cooperation technology FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview

More information

ARM mbed mbed OS mbed Cloud

ARM mbed mbed OS mbed Cloud ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics

More information

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit July 2017 By: www.smk-logomotion.com Introduction Presentation is describing NFC enabled microsd smart card (LGM Card) Technical

More information

Smart Grid Maturity Model

Smart Grid Maturity Model Smart Grid Maturity Model Austin Montgomery Software Engineering Institute Carnegie Mellon University Software Engineering Institute Carnegie Mellon University 2 SEI is a federally-funded research and

More information

Product info. PCKeeper - Ver Windows 10. PCKeeper Antivirus - Ver Windows 10. BRATISLAVA, Slovakia, Sept 2, 2016

Product info. PCKeeper - Ver Windows 10. PCKeeper Antivirus - Ver Windows 10. BRATISLAVA, Slovakia, Sept 2, 2016 Essentware S.A. the official owner of PCKeeper brand informs it s users that both of company products have successfully passed the Windows 10 compatibility qualification. PCKeeper Live and PCKeeper Antivirus

More information

NETWORK SECURITY STORMSHIELD. Unified Threat Management Solutions and Next- Generation Firewalls

NETWORK SECURITY STORMSHIELD. Unified Threat Management Solutions and Next- Generation Firewalls NETWORK SECURITY STORMSHIELD NETWORK SECURITY Unified Threat Management Solutions and Next- Generation Firewalls Our Mission Make the digital world a sustainable and trustworthy environment while ensuring

More information

Server side management system for multiple IoT terminals in industrial systems

Server side management system for multiple IoT terminals in industrial systems Infineon Network Use Case Server side management system for multiple IoT terminals in industrial systems This system utilizes the technology of the Trusted Computing Group (TCG) as a time-to-market solution

More information

QLogic 2500 Series FC HBAs Accelerate Application Performance

QLogic 2500 Series FC HBAs Accelerate Application Performance QLogic 2500 Series FC HBAs Accelerate QLogic 8Gb Fibre Channel Adapters from Cavium: Planning for Future Requirements 8Gb Performance Meets the Needs of Next-generation Data Centers EXECUTIVE SUMMARY It

More information

Cybersecurity with Automated Certificate and Password Management for Surveillance

Cybersecurity with Automated Certificate and Password Management for Surveillance Cybersecurity with Automated Certificate and Password Management for Surveillance October 2017 ABSTRACT This reference architecture guide describes the reference architecture of a validated solution to

More information

Agilent E4982A LCR Meter

Agilent E4982A LCR Meter Agilent E4982A LCR Meter 1 MHz to 3 GHz Configuration Guide Ordering guide The following steps will guide you through configuring your E4982A. Standard furnished item Description Test head with 1m test

More information

Securing IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager

Securing IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager Securing IoT devices with Hardware Secure Element Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager 2 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris

More information

The Little Fuchsia Book of HPE Data Center Solutions

The Little Fuchsia Book of HPE Data Center Solutions The Little Fuchsia Book of HPE Data Center Solutions Introduction The data center has become a core focus of the digital economy. It s always been an important, though quiet, IT function, operating behind

More information

Scalable Security solutions to enable Cyber Security and to manage Digital Identities

Scalable Security solutions to enable Cyber Security and to manage Digital Identities Scalable Security solutions to enable Cyber Security and to manage Digital Identities It s all about managing identities GIC@CeBIT 2017 International Cyber Security Conference Axel Deininger 20.03.2017

More information

A C H I E V E B O T H W I T H K E Y S I G H T. Company Profile

A C H I E V E B O T H W I T H K E Y S I G H T. Company Profile A C H I E V E B O T H W I T H K E Y S I G H T 1 W E H E L P Y O U C R E AT E. I N N O VAT E. A N D D E L I V E R W H AT S N E X T. The innovation leader in electronic design and test for over 75 years

More information

Windows IoT Security. Jackie Chang Sr. Program Manager

Windows IoT Security. Jackie Chang Sr. Program Manager Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport

More information

Worldwide Mobile Imaging: Stimulating Demand and Usage

Worldwide Mobile Imaging: Stimulating Demand and Usage December 2005 Multi-Client Worldwide Mobile Imaging: Stimulating Demand and Usage Authors Jeff Hayes Jill Aldort Published by Market Research Project Objectives This study is designed to help digital camera

More information

$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales

$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales WHITE PAPER Flexible Key Provisioning with SRAM PUF SRAM PUF Benefits Uses standard SRAM Device-unique keys No secrets reside on the chip No key material programmed Flexible and scalable Certifications:

More information

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart

More information

Drive your future with Hammer

Drive your future with Hammer Drive your future with Hammer No.1 supplier for HDD and SSD Drive your future with Hammer >16 million drives sold Hammer is a leading storage distributor with 25 years experience. Combining flexibility

More information

SIMATIC. Industrial PC Microsoft Windows 7. Safety instructions 1. Initial startup: Commissioning the operating. system

SIMATIC. Industrial PC Microsoft Windows 7. Safety instructions 1. Initial startup: Commissioning the operating. system Safety instructions 1 Initial startup: Commissioning the operating 2 system SIMATIC Industrial PC Operating Instructions Restoring the factory settings of the operating system and 3 partitions (Restore)

More information

Making 5G Real. Ericsson Internal Guilherme Alves Ericsson

Making 5G Real. Ericsson Internal Guilherme Alves Ericsson Making 5G Real Guilherme Alves Ericsson 2018-05-17 Agenda The ecosystem Technologies at the heart of 5G Consumer interest levels Low Average High Consumers: Give us more with 5G! Higher performance is

More information

Date: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc.

Date: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc. Date: 13 June 2018 @qualcomm Location: Sophia Antipolis Integrating the SIM Dr. Adrian Escott Qualcomm Technologies, Inc. Agenda 1 2 3 4 5 6 Path to isim isim Size benefit Hardware Architecture Certification

More information

Cyber Security: It s all about TRUST

Cyber Security: It s all about TRUST www.pwc.com/vn Cyber Security: It s all about TRUST 29 th March 2017 Robert Tran Cybersecurity leader, Vietnam Content s Digital IQ Survey 1 Current state of Cybersecurity in Vietnam 2 2 Our global team

More information

CYBERSMART BUILDINGS. Securing Your Investments in Connectivity and Automation

CYBERSMART BUILDINGS. Securing Your Investments in Connectivity and Automation CYBERSMART BUILDINGS Securing Your Investments in Connectivity and Automation JANUARY 2018 WELCOME STEVE BRUKBACHER Application Security Manager Global Product Security Johnson Controls 1 WHY ARE WE HERE

More information

TAGITM Winter Summit 2017 Evaluating All Flash Storage for the Enterprise

TAGITM Winter Summit 2017 Evaluating All Flash Storage for the Enterprise TAGITM Winter Summit 2017 Evaluating All Flash Storage for the Enterprise Presented by: John Barnard Field Solutions Manager, SHI Enterprise Solutions Group Topics Four things you should know about flash

More information

ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO

ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing Pierre Garnier, COO 1 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium

More information

Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017

Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017 Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017 Trust is vital and it s what we provide enabling our clients to deliver

More information

WatchGuardONE Channel Program

WatchGuardONE Channel Program WatchGuardONE Channel Program Powerful Reasons to Join TeamRED 100% Channel Focused As a 100% channel-focused organization, we are dedicated to your success. You are our sales team, and if you don t sell

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,

More information

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Jason Rosselot, CISSP, Director Product Cyber Security, Johnson Controls AIA Quality Assurance The Building Commissioning

More information

The European Company that protects the world

The European Company that protects the world Limitless Visibility, Absolute Control The European Company that protects the world pandasecurity.com/business/ Generating Trust and Making Us Stand Out Over the last few years, Panda Security has designed

More information

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008 FACTS AND OPPORTUNITIES IN BRAZIL Gartner IT Security Summit Washington DC, June 2008 OUR OBJECTIVE TODAY Raise your awareness that there are several Brazilian IT Services and Solutions Providers that

More information

SECURITY MODELS FOR APPLICATION PROTECTION AND AGAINST REVERSE ENGINEERING

SECURITY MODELS FOR APPLICATION PROTECTION AND AGAINST REVERSE ENGINEERING SECURITY MODELS FOR APPLICATION PROTECTION AND AGAINST REVERSE ENGINEERING SECURITY @ KONTRON PETER MÜLLER, DIRECTOR PRODUCTLINE BOARDS & MODULES TELEREX OCTOBER, 2017 AGENDA 01 02 03 04 TECHNOLOGICAL

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud

More information

Car2Car Forum Operational Security

Car2Car Forum Operational Security Car2Car Forum 2012 14.11.2012 Operational Security Stefan Goetz, Continental Hervé Seudié, Bosch Working Group Security Task Force: In-vehicle Security and Trust Assurance Level 15/11/2012 C2C-CC Security

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat

More information

Adding value to your MS customers

Adding value to your MS customers Securing Microsoft Adding value to your MS customers Authentication - Identity Protection Hardware Security Modules DataSecure - Encryption and Control Disc Encryption Offering the broadest range of authentication,

More information

The Road to Industry 4.0

The Road to Industry 4.0 The Road to Industry 4.0 Secure remote access and active cyber protection for industrial machinery Hamburg, May 22, 2017 Fabian Bahr G+D Group Business Units and Divisions G+D Mobile Security Financial

More information

Smart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security

Smart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Meter Security Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Grids: Advanced power control, intelligence and communications New Business models and Services

More information

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY Verisec is a Swedish IT-security company specialized in digital identity and information security solutions for the banking and payments industry.

More information

In today s business environment, data creates value so it s more important than ever to protect it as a vital business asset

In today s business environment, data creates value so it s more important than ever to protect it as a vital business asset In today s business environment, data creates value so it s more important than ever to protect it as a vital business asset Seagate Secure Reliable Data Protection Solutions Always-on Data Protection

More information

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY OUR MISSION Make the digital world a sustainable and trustworthy environment

More information

The demands placed on commercial vehicles have evolved dramatically over the years. With new

The demands placed on commercial vehicles have evolved dramatically over the years. With new Mobile automation Around 2,000 employees work at the B&R headquarters in Eggelsberg, Austria. Technology leader The innovative spirit that keeps B&R at the forefront of industrial automation is driven

More information

Intelligent Building and Cybersecurity 2016

Intelligent Building and Cybersecurity 2016 Intelligent Building and Cybersecurity 2016 Landmark Research Executive Summary 2016, Continental Automated Buildings Association Presentation Contents 1. About CABA, Compass Intelligence & This Research

More information

Architektura bezpieczeństwa dla otwartych zintegrowanych systemów administracji publicznej

Architektura bezpieczeństwa dla otwartych zintegrowanych systemów administracji publicznej Architektura bezpieczeństwa dla otwartych zintegrowanych systemów administracji publicznej Robert Michalski, Security Tiger Team, Central & Eastern Europe robert.michalski@pl.ibm.com Agenda 1 2 3 Threats

More information

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Jim Reavis CEO and Founder Cloud Security Alliance December 2017 CLOUD THREAT HUNTING Jim Reavis CEO and Founder Cloud Security Alliance December 2017 A B O U T T H E BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT C L O U D S E C U R I T Y A L L I A N C E GLOBAL,

More information

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers 1 BRIDGE TO GLOBAL MARKET FOR MVNOs Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers How to compete with big MNOs on equal terms 2 Your

More information

THE BEST OF ICT WITH A HUMAN TOUCH

THE BEST OF ICT WITH A HUMAN TOUCH THE BEST OF ICT WITH A HUMAN TOUCH VINCI & VINCI ENERGIES WORLDWIDE PLAYER IN CONCESSIONS & CONSTRUCTION VINCI ENERGIES IS A DIVISION OF VINCI Technology Roads Construction Concessions VINCI VINCI Energies

More information

Cambridge TECHNICALS LEVEL 3

Cambridge TECHNICALS LEVEL 3 Cambridge TECHNICALS LEVEL 3 IT GUIDE Version ocr.org.uk/it CONTENTS Introduction 3 Communication and employability skills for IT 4 2 Information systems 5 3 Computer systems 6 4 Managing networks 7 5

More information

Enabling Smart Lighting for Smart Cities. How Cheen Ng 18 August 2017

Enabling Smart Lighting for Smart Cities. How Cheen Ng 18 August 2017 Enabling Smart Lighting for Smart Cities How Cheen Ng 18 August 2017 Infineon at a glance Business Segments Automotive 17% (ATV) 31% 41% 11% Revenue FY 2016 Industrial Power Control (IPC) Power Management

More information

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017 mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud

More information

EtherCAT and Industrie 4.0 & Industrial Internet of Things

EtherCAT and Industrie 4.0 & Industrial Internet of Things EtherCAT and & Industrial Internet of Things? Oliver Fels Technology Marketing EtherCAT Technology Group ETG Headquarters, Germany 22.09.2016 EtherCAT + & IoT What is?? : the 4 th Industrial Revolution

More information