In this video, we explore the key requirements for securely provisioning keys and certificates into embedded systems of connected devices. We also discuss three different provisioning methods, highlighting their benefits and trade-offs, with a special emphasis on how the TrustMANAGER provisioning flow simplifies the infrastructure and helps comply with upcoming regulations.
TrustMANAGER - https://www.microchip.com/en-us/products/security/trust-platform/trustmanager
TrustFLEX - https://www.microchip.com/en-us/products/security/trust-platform/trustflex
TrustCUSTOM - https://www.microchip.com/en-us/products/security/trust-platform/trustcustom
Trust Platform Design Suite - https://www.microchip.com/en-us/products/security/trust-platform/tpds
To view this video, please click manage cookies below and accept functional cookies.
{"SalesForceSecurePath":"https://microchip.my.salesforce-scrt.com","EmbeddedServiceName":"Messaging_For_Microchip","SalesForcePath":"https://microchip.my.site.com/ESWMessagingForMicrochi1755319480924","AgentAvailableHeader":"No problem. Chat with our engineering experts or schedule a call that's convenient for you.","ScheduleCallUrl":"https://microchip.my.site.com/schedulemeetingportal/s/","SalesforceOrgId":"00Do0000000KAkK","JsUrl":"https://microchip.my.site.com/ESWMessagingForMicrochi1755319480924/assets/js/bootstrap.min.js"}