WEBINAR: Avoid Design Cloning: Protect Your Devices with ADI’s Secure Authenticators

ADI_Logo_Approved_500

Date: Wednesday, May 25, 2022

Time: 15:00 PM Central European Summer Time

Duration: 1 hour

Your designs are worth cloning.

The reason? The increasing complexity of electronic systems and the related R&D spending. Contract manufacturers may over-produce successful products, or even be copied by competitors or opportunists.

How does this impact you?

The counterfeit IP or product impacts your revenue and your reputation when your brand is related to low-quality or even safety concerning counterfeit products.

Devices and appliances interfacing with networks may be subject to remote attacks. This is especially critical for industrial process automation or medical appliances.

Learn how hardware-based Secure Authenticator chips can provide a high level of security to your designs at an affordable cost.

Learning Objectives

    • Define the Secure Authenticator technology
    • Identify how a Secure Authenticator utilizes secure cryptography to protect designs
    • How to use a Secure Authenticator to:
       - Prevent cloning
       - Protect intellectual property
       - Comply with cybersecurity requirements for industrial and medical applications

REGISTER NOW

Speaker

Stéphane di Vito
Senior Principal member of Staff, Product Definer | Analog Devices
Stéphane Di Vito has been an Embedded Systems and Security Expert in the Security, Software and Processors business group at Analog Devices for the last ten years. Stéphane has been working in security and embedded software engineering for 20 years. He previously spent five years working at Gemalto, specializing in highly secure firmware embedded into smart card processors. Then he worked at Atmel’s former security ICs department, where he developed embedded security modules for industrial, gaming, health, financial, and privacy protection applications. After Atmel he spent three years at Newsteo, a startup company specializing in wireless industrial measurement, as firmware designer and developer, before joining Maxim Integrated. He is now in charge of the product definition of the Secure Authenticators product line.

Can’t attend the live event? We’ve got you covered! Register now, and we’ll send you a link to view the webinar on-demand after the live broadcast

ADI_event_page_banner


Upcoming Events

Sorry, your filter selection returned no results.

Nous avons mis à jour notre politique de confidentialité. Prenez un moment pour lire les changements. En cliquant sur "J'accepte", vous acceptez la clause de confidentialité d'Arrow Electronics ainsi que les conditions d'utilisation.

Notre site Internet place des cookies sur votre appareil pour améliorer votre expérience et pour améliorer notre site. Pour en savoir plus sur les cookies que nous utilisons et la façon de les désactiver, cliquez ici. Des cookies et des technologies de suivi peuvent être utilisés à des fins de marketing. En cliquant sur « Accepter », vous consentez au placement de cookies sur votre appareil et à notre utilisation de technologies de suivi. Cliquez sur « En savoir plus » pour de plus amples informations et instructions sur la façon de désactiver les cookies et les technologies de suivi. Même si l'acceptation des cookies et technologies de suivi est volontaire, leur désactivation peut entraîner un mauvais fonctionnement du site Internet et certaines publicités peuvent être moins pertinentes pour vous. Nous respectons votre confidentialité. Lisez notre politique de confidentialité ici.