2022 Technology Summit: Accelerating Demand for Trusted Hardware and Confidential Computing in the IoT
Price:
Starting at USD 3,000
Publish Date: 18 Nov 2021
Code: PT-2549
Research Type: Presentation
RELATED SERVICE:
Actionable Benefits
- Discover the technologies available for creating a trusted foundation in IoT devices.
- Understand the drivers for trusted hardware in IoT.
- Identify the key applications for confidential computing.
Research Highlights
- Insights from industry experts from different layers of the value chain (Infineon, Trustonic, Idemia, Orange) on the role of trusted hardware and confidential computing in the IoT.
Critical Questions Answered
- Why is trusted hardware important from a security perspective? What does it provide in terms of value to an end-user or an implementer?
- How necessary is it to secure the compute function of a device? What are the key drivers for building-in that type of protection?
- Building on that trusted foundation at the device level, what are the main priorities for service provisioning from a device & credentials lifecycle management perspective?
- How can operators leverage a trusted hardware base to provide secure connectivity for the IoT? What role should operators have in the broader IoT security debate?
Who Should Read This?
- Product and solution development managers.
- Product marketing directors.
- Innovation and strategy directors.
- Silicon IP, Semiconductors and device OEMs.
- Connectivity and service providers.
- Communication service providers and network operators.