Video Player is loading.
Current Time 0:00
Duration 0:00
Loaded: 0%
Stream Type LIVE
Remaining Time 0:00
 
1x
  • Chapters
  • descriptions off, selected
  • subtitles off, selected

    SPS 2024: Protect the Intelligent Edge with Cybersecurity Solutions

    2025年03月25日

    Cybersecurity in Industrial Automated Control Systems (IACS) is a strategic imperative to ensure the safe, reliable, and efficient operation of critical infrastructure and industrial processes. This video showcases how ADI hardware-based secure authentication products protect a water treatment facility from potential cyberattacks to ensure the plant’s operational continuity, data integrity, and safety of personnel. These are fixed-function ICs offering a comprehensive set of cryptographic features, including authentication, encryption, secure data storage, life cycle management, and secure boot/update. By using ADI secure authenticators, our customers can ensure cybersecurity compliance of their industrial edge node devices to regulatory requirements while also protecting their business, personnel and critical infrastructure.

    Video Player is loading.
    Current Time 0:00
    Duration 0:00
    Loaded: 0%
    Stream Type LIVE
    Remaining Time 0:00
     
    1x
    • Chapters
    • descriptions off, selected
    • subtitles off, selected

      SPS 2024: Protect the Intelligent Edge with Cybersecurity Solutions

      2025年03月25日

      Cybersecurity in Industrial Automated Control Systems (IACS) is a strategic imperative to ensure the safe, reliable, and efficient operation of critical infrastructure and industrial processes. This video showcases how ADI hardware-based secure authentication products protect a water treatment facility from potential cyberattacks to ensure the plant’s operational continuity, data integrity, and safety of personnel. These are fixed-function ICs offering a comprehensive set of cryptographic features, including authentication, encryption, secure data storage, life cycle management, and secure boot/update. By using ADI secure authenticators, our customers can ensure cybersecurity compliance of their industrial edge node devices to regulatory requirements while also protecting their business, personnel and critical infrastructure.