WEBINAR: Avoid Design Cloning: Protect Your Devices with ADI’s Secure Authenticators
OnDemand Webinar | (Date: Wednesday, May 25, 2022)
Duration: 1 hour
Your designs are worth cloning.
The reason? The increasing complexity of electronic systems and the related R&D spending. Contract manufacturers may over-produce successful products, or even be copied by competitors or opportunists.
How does this impact you?
The counterfeit IP or product impacts your revenue and your reputation when your brand is related to low-quality or even safety concerning counterfeit products.
Devices and appliances interfacing with networks may be subject to remote attacks. This is especially critical for industrial process automation or medical appliances.
Learn how hardware-based Secure Authenticator chips can provide a high level of security to your designs at an affordable cost.
Learning Objectives
• Define the Secure Authenticator technology
• Identify how a Secure Authenticator utilizes secure cryptography to protect designs
• How to use a Secure Authenticator to:
- Prevent cloning
- Protect intellectual property
- Comply with cybersecurity requirements for industrial and medical applications
Speaker
Stéphane di Vito
Senior Principal member of Staff, Product Definer |
Analog Devices
Stéphane Di Vito has been an Embedded Systems and Security Expert in the Security, Software and Processors business group at Analog Devices for the last ten years. Stéphane has been working in security and embedded software engineering for 20 years. He previously spent five years working at Gemalto, specializing in highly secure firmware embedded into smart card processors. Then he worked at Atmel’s former security ICs department, where he developed embedded security modules for industrial, gaming, health, financial, and privacy protection applications. After Atmel he spent three years at Newsteo, a startup company specializing in wireless industrial measurement, as firmware designer and developer, before joining Maxim Integrated. He is now in charge of the product definition of the Secure Authenticators product line.
Can’t attend the live event? We’ve got you covered! Register now, and we’ll send you a link to view the webinar on-demand after the live broadcast
Upcoming Events
Analog Devices' webinar: Edge to Cloud, Connect & Control with Remote IO modules
This Analog Devices webinar will explain how such modules can be leveraged in the automation system and implemented today to provide more flexibility, edge node insights and connectivity to fit into an edge-to-cloud based AI-driven system.