What works best with IoT devices: hardware vs software presentation

Posted on Thursday, March 2, 2017 by RICHARD HARRIS, Executive Editor

Icon Labs, a provider of security solutions for IoT and edge devices, has announced Icon Labs President Alan Grau has been selected to present at Embedded World Show Europe.
 
Alan’s presentation will provide engineers, product managers and executives with an overview of the available security technologies for the IoT and IIoT, and a framework to start building secure IoT devices.
 
Engineers developing IoT devices have a wide range of choices for adding security to their device. Hardware security elements including TPMs, TEEs and secure elements are available from a variety of vendors. Software security solutions are also available that can provide a variety of features include secure communication, authentication, firewalls, secure boot, secure firmware updates and security management.
 
This presentation will discuss some recent hacks, cyber security trends, and a detailed overview of IoT security technologies and how they can be applied to secure IoT devices. Specific attention will be paid to the trade-offs and interactions between hardware and software security implementations.
 

Topics covered include:


- Hardware security: description of TPMs, TEEs, TrustZone and other HW security elements and how they are used in IoT devices
- Software security: Firewalls, encryption, security protocols and secure boot
- Hardware vs. Software: the role of HW security vs. the role of SW security
- What security features does your IoT device require? What are the minimum requirements?
- Scalability issues: how to address security for sensors, endpoints and gateways
- System level view of security
 
 
Icon Labs’ products provide embedded security for IoT and Machine-to-Machine (M2M) solutions in aerospace, industrial, medical control devices, and consumer electronics. The Floodgate Security Framework provides a “defense in depth” solution to protect control units and endpoint devices from cyber threats, aid in compliance with regulatory mandates and guidelines, and gather and report command, event, and device status information for audit requirements.

More App Developer News

Tether QVAC SDK Powers AI Across Devices and Platforms



APAC 5G expansion to fuel 347B mobile market by 2030



How AI is causing app litter everywhere



The App Economy Is Thriving



NIKKE 3.5 anniversary update livestream coming soon



New AI tool targets early dementia detection



Jentic launch gives AI agents api access



Experts warn ai-generated health content risks misinterpretation without human oversight



Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines



AccuWeather Launches ChatGPT Integration for Live Weather Updates



Stop Using Business Jargon: 5 Ways Buzzwords Damage Job Performance



IT spending rises as banks balance legacy and innovation



Tech hiring slumps as Software Developer job postings fall



AI is becoming more widespread in collaboration tools



FCC prohibits new foreign router models citing critical infrastructure risks



ChatGPT Carbon Footprint Matches 1.3 Million Cars Report Finds



Lens Launches MCP Server to Connect AI Coding Assistants with Kubernetes



Accelerating corporate ai investment returns



Enviromates tech startup launches global participation platform



Private Repository Secures the AI-driven Development Boom



UK Fintech Platform Enviromates Connects Projects Brands and Consumers



Env Zero and CloudQuery Announce Merger



How Industrial AI Is Transforming Operations in 2026



AI generated work from managers is damaging trust among employees



Foresight Secures $25M to Bridge Infrastructure Execution Gap



Copyright © 2026 by Moonbeam

Address:
1855 S Ingram Mill Rd
STE# 201
Springfield, Mo 65804

Phone: 1-844-277-3386

Fax:417-429-2935

E-Mail: contact@appdevelopermagazine.com