High-profile cyberattacks, and regulatory and compliance pressure is driving the need of robust security for Internet of things. It is critical for global customers to secure edge devices. Trusted solutions running in trusted execution environment, based on hardware security, is needed for increased robustness of entire security stack against cybersecurity threats.
Intel provides robust hardware security technologies across multiple generations of hardware. But developers find it challenging to use hardware security due to lack of security expertise and hardware programming skills.
Join Intel Security Product Manager Basant Kumar, and Intel Security Architect Srinivas Musti for a holistic discussion on how developers can take advantage of out-of-the-box Security solutions and effectively adopt hardware security without dealing with the underlying architectural complexity.
In this webinar, you will learn about :
Afterward, some participants may be offered an opportunity to participate in hands-on evaluation of the product in upcoming weeks, facilitated by Intel. Intel will provide nominal compensation for those participants completing the hands-on evaluation.
You won’t want to miss this opportunity to build cutting edge of security into your applications, so be sure to register now.
Required Fields(*)
Sr Product Manager - Intel
Basant Kumar is a IoT Security Product manager responsible for Trusted Edge Platform and developer enablement of security developers. Product management professional for Security, Management and IoT products for 16 years and very interested in solving the security challenges of myriad devices in an ever-connected world.
Principal Engineer - Intel
Srini Musti is a Principal Engineer and a Security Architect in Network and Edge division of Intel. He specializes in Security solutions that span Silicon, Platform and Software stack for network and edge devices. He actively engages with many IOT customers co-architecting and co-developing security solutions and is passionate about helping customers learn about various Intel security technologies and strategies they need to succeed. He is viewed as a credible industry leader and is a frequent speaker in many Conferences.