May 02, 2016The idea of providing network security to legacy embedded systems and the latest IoT devices is taking hold in the marketplace, but most vendors offer a single component, like a secure boot or a simple encrypted connection, without addressing other common attack vectors. The lack of product depth among software vendors is forcing engineers to integrate a confusing array of components from many sources, only to find that they do not play well together or impose an unwieldy demand on scarce system resources. Icon Labs' Dave West outlines four device classes with common security concerns. (5 pages)
Simplifying Security for IoT Device Engineers and Manufacturers
SEND IT YOUR WAY
ASK THE EXPERTS
ASK A QUESTION FOR OUR EXPERTS
ASK THE EXPERTS
View previous question answers »