ECS - Embedded Conference Scandinavia, is a two-day event that covers all the hot topics in the world of embedded technology. ECS has been growing steadily since its inception in 2006 and has developed into the largest European embedded conference, offering world-class speakers, a compact exhibition area for the companies that are the most representative from a technological standpoint, networking opportunities, and the annual Swedish Embedded Award.
Be it the monetization of IoT and IIoT applications, security for connected systems and sensitive data, or IP protection against counterfeiting and reverse engineering, Industrie 4.0 has opened new dimensions for secure license and entitlement management. Wibu-Systems approaches the digital transformation with a holistic view, centered around a single technology, CodeMeter, that is able to interface with multiple platforms (operating and back-office systems), multiple devices (computers, embedded systems, mobile units, PLCs, microcontrollers), and multiple secure elements (USB dongles, memory cards, ASICs, TPMs). Visit our booth, to discover an entire universe of possibilities that you can easily unlock with one single technology – CodeMeter!
On November 7th, 11.00 am to 11.30 am, Stefan Bamberg, Wibu-Systems’ Senior Key Account and Partner Manager, will explain how to leverage embedded security as the key to industrial economy renaissance. The IIoT offers vast opportunities to optimize industrial processes and revitalize the world’s economy. But how to capitalize effectively and securely on digital transformation in the industrial realm? Past makers of industrial equipment served their markets by producing machines with fixed features for fixed purposes. A regular income meant selling maintenance services or parts and materials. With value shifting from hardware to software, business opportunities and security challenges abound. Engineering, logistics, and maintenance costs can be saved by producing identical hardware with functions activated on demand. With such control, business models can be built around users’ real-world needs. As the key unlocking a machine’s real capabilities, software becomes a major asset that deserves protection from piracy, reverse engineering, and manipulation. Safeguarding firmware and software updates from internal and external attacks becomes as important as keeping the factory keys safe.