TRAINING

Training Cover image for Securing a Connected World - Chip-to-Cloud Security Solutions for the Network Edge
Securing a Connected World: Chip-to-Cloud Security Solutions for the Network Edge
Duration: 34 minutes 10 seconds
Presented in Spanish / En español
SecEdge Security Platform overview, including secure boot & updates, threat detection and remediation, and protecting AI at the Edge. Presented in Spanish / En español.
SPEAKER: Julia Narvaez, Director, Product Engineering & Delivery, SecEdge, Inc.
Critical Elements of Secure Device Secure Boot_1 cover
Critical Elements of a Secure Device: Rich and Trusted Environments, Memory Partitioning, Trusted Applications, and End-to-End Secure Boot
Module: 1 of 4
Duration: 19 minutes
This module covers the fundamentals of device security. First we will describe the concept of a secure enclave (creating partitioned memory for secure environments). Next, the concepts of a Trusted Execution Environment (TEE) and corresponding Trusted Applications will be explained. Finally, the step-by-step process of a true end-to-end secure boot process will be detailed. Learn about:
The most important elements of a secure device.
Creating a secure memory enclave using ARM TrustZone
How to use a Trusted Execution Environment
Understanding and implementing Trusted Applications
How to implement a complete secure boot process
SPEAKERS:
Mike Hendrick, VP Engineering, SecEdge, Inc.
Larry O'Connell, VP Marketing, SecEdge, Inc.
Protecting AI at the Edge_Protecting IP_2 cover
Protecting AI at the Edge: Implementing Anti-Piracy Techniques to Secure Critical Intellectual Property
Module: 2 of 4
Duration: 15 minutes
For many IoT Device vendors, Artificial Intelligence (AI) or Machine Learning (ML) algorithms are business critical and cannot be compromised. Theft of this kind of intellectual property can create long-term damage to a company's revenue and brand. This module will explain how to design a device with secure applications and data that can be protected throughout the supply chain. Learn about:
Using the Secure Enclave to build a secure environment for applications
Storing and accessing data in the secure environment
How to develop a secure application in the Trusted Execution Environment (TEE)
Ensuring Secure Software Provisioning during the Manufacturing Process
SPEAKERS
Mike Hendrick, VP Engineering, SecEdge, Inc.
Larry O'Connell, VP Marketing, SecEdge, Inc.
Secure Firmware Updates and Device Fault Recovery Covershot
Secure Firmware Updates and Device Fault Recovery
Module: 3 of 4
Duration: 21 minutes
To ensure that a device is running at peak performance throughout its lifecycle, firmware updates, administered locally over remotely Over-the-Air (OTA), are essential. In the event of a failure or threat, a device must also be able to quickly recover to a previous safe state. Both of these processes can leave a device particularly vulnerable to attacks if not administered properly. This module covers best practices for device firmware updates and recovery. Learn how to:
Integrate update and firmware recovery applications in a secure device
Protect new or backup firmware as it is being installed during the update and recovery process
SPEAKERS
Mike Hendrick, VP Engineering, SecEdge, Inc.
Larry O'Connell, VP Marketing, SecEdge, Inc.
Critical Elements of a Secure Device_4 cover
Integrating Embedded Device Security with Cloud Services
Module: 4 of 4
Duration: 19 minutes
Today's applications processors can deliver a rich array of information regarding the health and safety of an IoT Device. Devices can be managed and monitored at scale using cloud services, and the cloud also enables device vendors to monitor threat events and address them. This module covers the concepts for secure device integration with the cloud to enable these services. Learn about:
Key elements of Cloud Integration
Using MQTT to enable messaging for Cloud Services
Monitoring threat events and applying remediation
SPEAKERS
Mike Hendrick, VP Engineering, SecEdge, Inc.
Larry O'Connell, VP Marketing, SecEdge, Inc.

Want to simplify—and strengthen—your security, eliminate deployment complexity, and slash expenses associated with ineffective legacy solutions? Let’s talk.