Terms
Privacy
/
© 2023 Wind River Systems, Inc.
VIDEO: What are Embedded Containers?
ON DEMAND VIDEO: How Secure Software Supply Chains Bolster Embedded Security and Reduce Spend
WHITE PAPER: Securing the DevSecOps Environment
Want to learn more?
Explore related resources.
Tips for securing embedded systems containers from development to deployment
Security risks surrounding embedded container technology
Fundamentals of containers and their adoption in embedded systems
You will learn:
Containerization revolutionizes software deployment by packaging applications and their dependencies into portable, isolated units. According to Enterprise Strategy Group research, 77% of organizations say they support 11 to 20 or more containers per host.
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
Wind River On-Demand
Web Seminar
Tuesday, August 29, 2023
8 a.m. PT | 11 a.m. ET
Secure Your Embedded Containers from Cloud to Edge
Talk to a Wind River Expert /
Talk to a Wind River Expert /
Explore Wind River Studio Safety and Certification /
Explore Wind River Studio Safety and Certification /
Thank you for registering.
You will receive an email confirmation shortly.
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
Thank you for registering.
The video will begin playing shortly.
Click here if the video disappears
This event has already occurred.
Check back soon for the on-demand recording.
®
In embedded systems, containerization streamlines deployment, enabling seamless application management across diverse devices. It also invites security risks, including remote code executions, man-in-the-middle attacks, and privilege escalation. Thwarting these requires meticulous attention to development practices and deployment strategies.
Register Now
Register Now
®
Paul Nashawaty
Principal Analyst, Enterprise Strategy Group
+ Read Bio
Speakers:
With more than 20 years of experience as a technologist, Lito Molina has worked with some of the best, brightest, and most diverse teams to develop and deploy secure systems for aerospace and defense companies. He has provided both security thought leadership and hands-on experience in the areas of information security, cybersecurity, cloud security, and product security. This experience allows him to effectively communicate and explain the complexities regarding cybersecurity risks and its impacts for both product and information systems to customers and internal stakeholders.
®
®
BIO
Rizalito “Lito” Molina
System Security Architect, Wind River
ESG Principal Analyst Paul Nashawaty has extensive knowledge of digital transformation initiatives, including platform engineering across front-end and back-end on-premises and cloud-based applications. He has more than 25 years of experience in delivering go-to-market strategies, including identifying new routes to market, expanding and developing partner ecosystems, and achieving positive business results through the creation and execution of strategic plans.
BIO
Paul Nashawaty
Principal Analyst, Enterprise Strategy Group
Rizalito “Lito” Molina
System Security Architect,
Wind River
+ Read Bio
He now serves as senior security architect for the Wind River Field Engineering team. He collaborates with external customers and works internally with cross-functional teams to deliver value-driven solutions with security built in. He enjoys taking on technical challenges and continues to evangelize good cybersecurity postures for Wind River products and solutions.