Embedded World 2017

2017-03-14 - 2017-03-16
Nuremberg, Germany

The Industrial Internet has ignited a technological revolution and an economic renaissance that are both proceeding at an unprecedented pace. Academia, governments, and industrial organizations are supporting this shift. But how can manufacturing stakeholders really get ready and restructure their entire production and sales organizations to take full advantage of this revolution? On March 15th, 10.30-11.00 am, Oliver Winzenried, CEO and founder of Wibu-Systems, will talk about Reshaping the Embedded System Business.

An uncontrolled explosion of the amount of data moving between cyber-physical systems is exposing systems, workforces, and vendors to unprecedented risks and cyber-attacks that have the potential to destabilize public transportation, telecommunications, and business with frightening frequency.

The crucial factor that the entire infrastructure should be designed for is trustworthiness, which the Industrial Internet Consortium defines with five core characteristics in its Security Framework: Security, Safety, Reliability, Resilience, and Privacy. With CodeMeter, Wibu-Systems offers powerful preventative security measures to safeguard devices, machines, and plants. The technology blends cutting edge encryption methods, secure boot, and hardware-based key storage capabilities to protect intelligent device manufacturers against counterfeiting, reverse engineering, and tampering. Existing systems in the brownfield are easily retrofitted with this comprehensive set of protection, licensing, and security tools, providing not just a streamlined process, but also a cost effective solution.

Business is not just about saving, it lives from forward thinking. In the first place, embedded computing technology vendors are fully in control of the distribution of their intellectual property; by protecting their software, their revenue collection will match the actual number of active users. Secondly, by delivering the same hardware to all customers and enabling features on demand, OEMs can modulate their offerings to meet market demands. Additionally, using the same hardware and software technology, OEMs can protect the intellectual property of their customers at the same time.

This holistic vision couples out-of-the-box security with hardware manufacturing components to increase user and operational confidence in the new IIoT designs. Technological versatility and business model scalability are key for the granular implementation of new security paradigms across all sectors of industry that want to monetize software-powered processes.


To top