Presented by
-
Director, Mass Market Industrial Edge Processing, NXP Semiconductors
-
VP of EMEA Business Development and Technical Sales, Timesys
Sign in to access this content and additional site features.
As smart connected systems are deployed widely, ensuring the security of these systems and the data they process is ever more critical. Checking authenticity of software running on these remote connected devices is paramount to ensuring their security.
To achieve this, an essential best practice is to establish secure boot and chain of trust in the software running on your embedded Linux systems.
This presentation explores the “secure by design” approach to software security for embedded systems using NXP i.MX processors.
Subscribe to our newsletter to stay updated with our latest developments and if you need further assistance, we are here to help.
Subscribe Contact Support