The security of your device systems and software is critical for your customers. Heightened cyber-attacks, stringent privacy requirements, and increased breach risks all demand that security is baked into your product design, not slapped on as an afterthought.
Too often, security is viewed as requiring performance or functional trade-offs, with impacts on boot times, file system performance and the firmware upgrade process. Choosing the correct security components can help avoid trade-offs and alleviate performance concerns.
Do you have a plan for defending your open source, embedded Linux based product against security threats?
Join us for this Timesys University five-part webinar series that will walk you through the process of building a security-focused, embedded Linux-based device using select Advantech RISC platforms powered by NXP i.MX 6 series applications processors. During this series, you’ll learn industry best practices for designing secure products and maintaining that security posture over time without hampering product performance. We’ll explore how to reduce the attack surface of the systems and software you use in your products, to lessen the risk of a breach or security incident. We’ll discuss how to bring products to market that enable your customers to meet essential security compliance requirements, and you’ll learn about the tools, techniques and services available to help you “Secure by Design” and “Stay Secure.”
Sessions in this webinar series include:
Session 1: Monitoring and patching security vulnerabilities throughout the embedded Linux product lifecycle
Thursday, May 17, 2018 | 2:00 PM EDT
Details / Register for Session 1
Session 2: Verifying the authenticity of software running on your device
Thursday, May 31, 2018 | 2:00 PM EDT
Details / Register for session 2
Session 3: Leveraging open source software to protect IP and data on the device
Thursday, June 14, 2018 | 2:00 PM EDT
Details / Register for Session 3
Session 4: Security in production: Updating & deploying software OTA securely
Thursday, June 28, 2018 | 2:00 PM EDT
Details / Register for Session 4
Session 5: Auditing and hardening security best practices
Thursday, July 12, 2018 | 2:00 PM EDT
Details / Register for session 5