Hi [[ session.user.profile.firstName ]]

Mocana Corporation

  • Date
  • Rating
  • Views
  • Automated Security Lifecycle Management – Mocana TrustCenter
    Automated Security Lifecycle Management – Mocana TrustCenter
    Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana Recorded: Oct 10 2018 46 mins
    Part 3 Automated Certificate Management

    Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
  • Industrial Cybersecurity: Zero Touch Provisioning
    Industrial Cybersecurity: Zero Touch Provisioning
    Sid Snitkin, ARC Advisory Group, Guy AlLee, Intel, Dean Weber, Mocana Corporation, and Lucian Fogoros, IIoT World Recorded: Sep 26 2018 98 mins
    IoT Industrial Cloud systems are rapidly maturing as packaged systems that can sense, collect, analyze, and action on edge devices. However, the software-based device security and manual/proprietary provisioning methods delivered by platform providers are preventing deployments from scaling.

    In this webinar, we decompose the industrial data pipeline and demonstrate where device management security services instrumented for hardware security can be applied to build a connected security model that attests, provisions, updates, and manages devices. Automated secure device provisioning without human intervention is the key scaling element to place more devices into service to accelerate value from the Industrial Cloud.
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Srinivas Kumar Vice President of Engineering, Mocana & Keao Caindec, Vice President of Marketing, Mocana Recorded: Sep 26 2018 45 mins
    Part 3 Securing Firmware Updates and Patches

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new Iot connected world, you need to think about more than just the data and monitoring hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • Automated Security Lifecycle Management – Mocana TrustCenter
    Automated Security Lifecycle Management – Mocana TrustCenter
    Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana Recorded: Aug 29 2018 46 mins
    Part 2 - Update Service

    Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana Recorded: Aug 15 2018 46 mins
    Part 2 Dangers of Relying on Threat Detection

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new connected world, you need to think about more than just the data and watching hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • Securing Containers in IIoT Gateways and Endpoints with TPM 2.0
    Securing Containers in IIoT Gateways and Endpoints with TPM 2.0
    Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana Recorded: Aug 8 2018 46 mins
    Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto-processor that includes multiple physical security mechanisms to make it tamper resistant, and malicious software is unable to tamper with the security functions of the TPM. This session will cover how Mocana enables the use TPM certified keys to secure Docker containers, LinuX Containers (LXCs) and VMs on industrial IoT gateways and endpoints.
  • Automated Security Lifecycle Management – Mocana TrustCenter
    Automated Security Lifecycle Management – Mocana TrustCenter
    Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana Recorded: Jul 25 2018 39 mins
    Part 1 Enrollment Service

    Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana Recorded: Jul 18 2018 40 mins
    Part 1 - Securing the Boot Process

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new IoT connected world, you need to think about more than just the data and monitoring hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • IoT Security Best Practices: Migrating Away from Open Source Security
    IoT Security Best Practices: Migrating Away from Open Source Security
    Srinivas Kumar Vice President of Engineering, Mocana & Keao Caindec, Vice President of Marketing, Mocana Recorded: Apr 11 2018 42 mins
    Part 3 – How to Migrate Safely off of Open Source Security and SSL Libraries

    Open source security software has made it easy for developers to get started with securing IoT devices. In this webinar (Part 3 in a 3-part series), you’ll hear from industry experts on how to migrate off of open source security and SSL libraries with Mocana.
  • Endpoint Security Best Practices: Implementing the New Guidance from IIC
    Endpoint Security Best Practices: Implementing the New Guidance from IIC
    Joe Weiss, Applied Control Solution, LLC, Dean Weber, CTO, Mocana & Keao Caindec, Vice President of Marketing, Mocana Recorded: Apr 4 2018 47 mins
    The industrial Internet Consortium (IIC) has released the Endpoint Security Best Practices (ESBP) document that provides recommendations on the type of security industrial equipment manufacturers and operators should implement on endpoint devices. In this webinar, industry experts will provide an overview of the recommendations and demonstrate how to approach implementing the guidance.

Embed in website or blog