LinuxLink Login   |   1.866.392.4897 |   sales@timesys.com

The security of your device systems and software is critical for your customers. Heightened cyber-attacks, stringent privacy requirements, and increased breach risks all demand that security is baked into your product design, not slapped on as an afterthought.

Too often, security is viewed as requiring performance or functional trade-offs, with impacts on boot times, file system performance and the firmware upgrade process. Choosing the correct security components can help avoid trade-offs and alleviate performance concerns.

Do you have a plan for defending your open source, embedded Linux based product against security threats?

Join us for this Timesys University five-part webinar series that will walk you through the process of building a security-focused, embedded Linux-based device using select Advantech RISC platforms powered by NXP i.MX 6 series applications processors. During this series, you’ll learn industry best practices for designing secure products and maintaining that security posture over time without hampering product performance. We’ll explore how to reduce the attack surface of the systems and software you use in your products, to lessen the risk of a breach or security incident. We’ll discuss how to bring products to market that enable your customers to meet essential security compliance requirements, and you’ll learn about the tools, techniques and services available to help you “Secure by Design” and “Stay Secure.”

This series ran May 17 – July 12, 2018 and was recorded.
 

Sponsored by:

 

Sessions in this webinar series include:

Session 1: Monitoring and patching security vulnerabilities throughout the embedded Linux product lifecycle

Details / Request Recording Link
 

Session 2: Verifying the authenticity of software running on your device

Details / Request Recording Link
 

Session 3: Leveraging open source software to protect IP and data on the device

Details / Request Recording Link
 

Session 4: Security in production: Updating & deploying software OTA securely

Details / Request Recording Link
 

Session 5: Auditing and hardening security best practices

Details / Request Recording Link