<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1448210&amp;fmt=gif">

2022 Technology Summit: Accelerating Demand for Trusted Hardware and Confidential Computing in the IoT

Price: Starting at USD 3,000
Publish Date: 18 Nov 2021
Code: PT-2549
Research Type: Presentation
RELATED SERVICE:
Actionable Benefits

Actionable Benefits

  • Discover the technologies available for creating a trusted foundation in IoT devices.
  • Understand the drivers for trusted hardware in IoT.
  • Identify the key applications for confidential computing.
Research Highlights

Research Highlights

  • Insights from industry experts from different layers of the value chain (Infineon, Trustonic, Idemia, Orange) on the role of trusted hardware and confidential computing in the IoT.
Critical Questions Answered

Critical Questions Answered

  • Why is trusted hardware important from a security perspective? What does it provide in terms of value to an end-user or an implementer?
  • How necessary is it to secure the compute function of a device? What are the key drivers for building-in that type of protection?
  • Building on that trusted foundation at the device level, what are the main priorities for service provisioning from a device & credentials lifecycle management perspective?
  • How can operators leverage a trusted hardware base to provide secure connectivity for the IoT? What role should operators have in the broader IoT security debate?
Who Should Read This?

Who Should Read This?

  • Product and solution development managers.
  • Product marketing directors.
  • Innovation and strategy directors.
  • Silicon IP, Semiconductors and device OEMs.
  • Connectivity and service providers.
  • Communication service providers and network operators.