The development of new edge-to-enterprise systems brings exciting new opportunities, but it also introduces the security conundrum of how to ensure against attack and intrusion while maintaining flexibility, over-the-air programmability, and reduced costs.
This presentation discusses how Java is ideally placed to address this conundrum by providing the foundations of a trusted system. Ranging in scale from the smallest-footprint devices such as secure cards to the largest enterprise systems, Java delivers a secure and trusted execution environment through key elements such as identification, validation, key management, and encryption, as you’ll learn in this session.