Terms
Privacy
/
© 2021 Wind River Systems, Inc.
Security features including secure boot, trusted boot, cryptographic processor algorithms, attestation, random number generation, secure key storage, physical tamper monitoring, and JTAG protection
Augmentation needed from software-based security features
Built-in security features for each processor architecture
What you will learn:
Forty-two percent of organizations that invest in stronger security measures report expedited digital transformation (Dell Technologies, 2019).
WIND RIVER On-Demand
WEB SEMINAR
Learn about the four drivers of digital transformation at the intelligent edge and the key questions that will help architect your success.
Unlocking Hardware Security Through Software
Talk to a Wind River Expert /
Talk to a Wind River Expert /
Arlen Baker,
Principal Security Architect, Wind River
Speaker
Join us to examine three primary processor architectures — NXP PPC, Intel , and Xilinx ARM — and the available hardware-based security features each includes, including their advantages and restrictions.
The impact of FIPS 140-2 certification needs and quantum computing
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
As the number of embedded systems at the intelligent edge proliferates, so do security threats. Every connected device, machine, or node represents a new attack surface. One way to address this is to fully leverage the secure capabilities already built into processors. Security features in the different hardware architectures vary widely and can only be unlocked with software.
®
®
WHITE PAPER: A Survey of Information Security Implementations for Embedded Systems
WHITE PAPER: A Survey of Information Security Implementations for Embedded Systems
WHITE PAPER: Software Security Across the Intelligent Edge
WHITE PAPER: Software Security Across the Intelligent Edge
WHITE PAPER: Securing the DevSecOps Environment
WHITE PAPER: Securing the DevSecOps Environment
Want to learn more?
Explore related resources.
Attend Security Summit 2021 /
Attend Security Summit 2021 /
If the video closes, click here.
Your video will open shortly in a window on top of this page.
Thank you for registering.