Terms
Privacy
/
© 2021 Wind River Systems, Inc.
VIDEO: What Can Simics Do For You?
VIDEO: What Can Simics Do For You?
WHITEPAPER: Cybersecurity and Secure Deployments
WHITEPAPER: Cybersecurity and Secure Deployments
Want to learn more?
Explore related resources.
James Hui
Senior Solutions Architect, Wind River
Speaker:
How to leverage Simics insights for attack analysis
How to use Simics to test for vulnerabilities
How to implement Simics to detect unauthorized system use
What you will learn:
In 2020, cyber incidents ranked as the most important business risk, according to the Allianz Risk Barometer.
Today’s complex systems are increasingly defined by software, which is incredibly difficult to test in a real environment — especially when other software is networked in. Hackers with malicious intent target systems that were designed to operate in isolation but have been interconnected and networked with added software, and thus made vulnerable with an increased attack surface.
Wind River Simics can help test system environments and changes, and ensure that threat surfaces are properly secured.
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
WIND RIVER On-Demand
Web Seminar
Learn about the four drivers of digital transformation at the intelligent edge and the key questions that will help architect your success.
Implementing Cybersecurity with Simics
Talk to a Wind River Expert /
Talk to a Wind River Expert /
Explore Wind River Simics /
Explore Wind River Simics /
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
®
®
EXPERT INTERVIEW: Cybersecurity, IoT, and Embedded Systems: Reducing Risk with Pen Testing
EXPERT INTERVIEW: Cybersecurity, IoT, and Embedded Systems: Reducing Risk with Pen Testing
If the video closes, click here.
Your video will open shortly in a window on top of this page.
Thank you for registering.