2022 Technology Summit: Accelerating Demand for Trusted Hardware and Confidential Computing in the IoT Image

2022 Technology Summit: Accelerating Demand for Trusted Hardware and Confidential Computing in the IoT

Purchase

Actionable Benefits

  • Discover the technologies available for creating a trusted foundation in IoT devices.
  • Understand the drivers for trusted hardware in IoT.
  • Identify the key applications for confidential computing.

Critical Questions Answered

  • Why is trusted hardware important from a security perspective? What does it provide in terms of value to an end-user or an implementer?
  • How necessary is it to secure the compute function of a device? What are the key drivers for building-in that type of protection?
  • Building on that trusted foundation at the device level, what are the main priorities for service provisioning from a device & credentials lifecycle management perspective?
  • How can operators leverage a trusted hardware base to provide secure connectivity for the IoT? What role should operators have in the broader IoT security debate?           

Research Highlights

  • Insights from industry experts from different layers of the value chain (Infineon, Trustonic, Idemia, Orange) on the role of trusted hardware and confidential computing in the IoT.         

Who Should Read This?

  • Product and solution development managers.
  • Product marketing directors.
  • Innovation and strategy directors.
  • Silicon IP, Semiconductors and device OEMs.
  • Connectivity and service providers.
  • Communication service providers and network operators.