WEBINAR: Avoid Design Cloning: Protect Your Devices with ADI’s Secure Authenticators

ADI_Logo_Approved_500

Date: Wednesday, May 25, 2022

Time: 15:00 PM Central European Summer Time

Duration: 1 hour

Your designs are worth cloning.

The reason? The increasing complexity of electronic systems and the related R&D spending. Contract manufacturers may over-produce successful products, or even be copied by competitors or opportunists.

How does this impact you?

The counterfeit IP or product impacts your revenue and your reputation when your brand is related to low-quality or even safety concerning counterfeit products.

Devices and appliances interfacing with networks may be subject to remote attacks. This is especially critical for industrial process automation or medical appliances.

Learn how hardware-based Secure Authenticator chips can provide a high level of security to your designs at an affordable cost.

Learning Objectives

    • Define the Secure Authenticator technology
    • Identify how a Secure Authenticator utilizes secure cryptography to protect designs
    • How to use a Secure Authenticator to:
       - Prevent cloning
       - Protect intellectual property
       - Comply with cybersecurity requirements for industrial and medical applications

REGISTER NOW

Speaker

Stéphane di Vito
Senior Principal member of Staff, Product Definer | Analog Devices
Stéphane Di Vito has been an Embedded Systems and Security Expert in the Security, Software and Processors business group at Analog Devices for the last ten years. Stéphane has been working in security and embedded software engineering for 20 years. He previously spent five years working at Gemalto, specializing in highly secure firmware embedded into smart card processors. Then he worked at Atmel’s former security ICs department, where he developed embedded security modules for industrial, gaming, health, financial, and privacy protection applications. After Atmel he spent three years at Newsteo, a startup company specializing in wireless industrial measurement, as firmware designer and developer, before joining Maxim Integrated. He is now in charge of the product definition of the Secure Authenticators product line.

Can’t attend the live event? We’ve got you covered! Register now, and we’ll send you a link to view the webinar on-demand after the live broadcast

ADI_event_page_banner


Upcoming Events

Sorry, your filter selection returned no results.

Hemos actualizado nuestra política de privacidad. Por favor tome un momento para revisar estos cambios. Al hacer clic en Acepto, usted está de acuerdo con la Politica de Privacidad de Arrow Electronics y sus condiciones de uso.

Nuestro sitio Web coloca cookies en su dispositivo para mejorar su experiencia y nuestro sitio. Lea más sobre las cookies que utilizamos y cómo desactivarlas aquió. Es posible que se utilicen las cookies y tecnologías de seguimiento con fines de marketing.
Al hacer clic en "Aceptar", usted está consintiendo la colocación de cookies en su dispositivo y el uso de tecnologías de seguimiento. Haga clic en "Leer más" a continuación para obtener más información e instrucciones sobre cómo desactivar las cookies y tecnologías de seguimiento. Si bien la aceptación de cookies y tecnologías de seguimiento es voluntaria, la desactivación de estos puede resultar en que el sitio web no funcione correctamente, y es posible que ciertos anuncios sean menos relevantes para usted.
Respetamos su privacidad. Lea nuestra política de privacidad aquió