Microchip logo
  • All
  • Products
  • Documents
  • Applications Notes

SHIELDS UP!

Build Confidence in Implementing Security Solutions

Are you concerned about security? Learn about the latest trends and new developments for safeguarding your designs. With decades of providing security product solutions used in diverse applications including healthcare, cloud connectivity, payment systems and missile systems, we can help guide you through the maze of challenges and options.

Join our security experts and partners as we provide a series of security-themed webinars designed to raise your awareness of security vulnerabilities and discuss leading-edge solutions to shield your applications from potential risks.

Shields Up!

To get advance notice of upcoming webinars, click on the “Join Our Mailing List” link to receive email notifications.

Upcoming Webinars:

Webinar #5: RISC-V Enclaves


Date: Wednesday, December 4, 2019
Time: 8:00
–8:30 a.m. PST

MultiZone™ Security is the first Linux® enclave for RISC-V. Our MultiZone™ demo will demonstrate how to secure the deterministic behavior of mixed-criticality systems where Linux and real-time come together in a single PolarFire® device.

 

Webinar #6: The Importance of Quantum Resistance for Critical Security Functions

Date: Wednesday, December 18, 2019
Time: 8:00
–8:30 a.m. PST

In the world of quantum computers, signature verification methods must be resistant to quantum computer attacks. Veridify’s security methods can be implemented solely in software, allowing developers to easily implement critical security functions such as secure boot and secure firmware updates on platforms such as the PolarFire® SoC FPGA. This webinar will also describe the power and scalability of DOME, a device on-boarding, management and enrollment platform for securing a PolarFire SoC FPGA throughout its life cycle.

Webinar #7: Trust&GO for Any Cloud


Date: Wednesday, January 15, 2020
Time: 8:00
–8:30 a.m. PST

Quickly and easily implement secure authentication for your Internet of Things design using our Trust&GO platform. We’ll show you how to streamline the process of enabling network authentication using our ATECC608A secure elements.

Webinar #8: Guidelines to Securing Embedded Applications

Date: Wednesday, January 29, 2020
Time: 8:00
–8:30 a.m. PST

Are you faced with a need for security in today’s ever-more connected world? Join us as we discuss leading-edge security trends, security standards for the Internet of Things and recommended guidelines for building your connected application.

Completed Webinars:

Webinar #1: Implementing Multizone Security in RISC-V Applications

Date: Wednesday, October 9, 2019
Time: 8:00
–8:30 a.m. PDT

Join Cesare Garlati, a long-time supporter of the RISC-V Foundation and active member of the RISC-V Security Group, as he shares the latest on RISC-V security and offers advice for developing secure applications, especially in Internet of  Things (IoT) devices that lack a Memory Management Unit (MMU).

 

Webinar #2: Microchip Trust Platform for the CryptoAuthentication™ Family

Date: Wednesday, October 23, 2019
Time: 8:00
–8:30 a.m. PDT

Learn about our Trust Platform, a three-tier provisioning service for our secure elements that also includes:

  • A new suite of tools
  • Pre-packaged code examples
  • A simple supply chain process to protect keys

Webinar #3: Protecting Your IP in a Cloud-Connected World

Date: Wednesday, November 6, 2019
Time: 8:00
–8:30 a.m. PST

The rapid explosion of cloud-enabled applications and businesses is generating a larger connectivity footprint. This means your IP is now facing a bigger and more global threat from hackers, counterfeiters and competitors. We will discuss threats and how to counter them using a hybrid solution comprised of both hardware and software.

Webinar #4: Trust Your Firmware: Secure Boot for Application Processors

Date: Wednesday, November 20, 2019
Time: 8:00
–8:30 a.m. PST

Secure boot protects against rootkit and bootkit attacks to the pre-boot firmware environment. This webinar discusses how to protect a system that boots from an external SPI Flash to extend a Root of Trust.