Follow us for Davos updates

IAR Systems

To find our more about
IAR Systems
visit:
IAR Systems
For more information visit:
Visit Website

IAR - Transition from an Internet of Broken Things to an Internet of Trust

The next wave of computing, based on hyperconnectivity and ubiquitous edge computing will inject technology into every aspect of our lives, with privacy and security across the physical worlds and metaverse becoming an increasingly significant challenge for individual and governments. “With increased connectivity in consumer, medical, industrial, and critical infrastructure domains, just how do we guarantee trust and privacy in a hyper-connected world of devices?”, is the question Haydn Povey, Chief Strategy Officer at IAR Systems poses. IAR is the leading global vendor of development tools for embedded systems, the bedrock of the Internet of Things. With 40 years of success, and hundreds of thousands of software developers utilizing their tools for edge-compute systems and device security, they are leading the charge for a more trustworthy connected future.

“The need to transition from an Internet of ‘broken’ Things to an ‘Internet of Trust’ is critical to both achieving device security and increasing consumer confidence in technology”, says Povey. But, in order to get there, governing bodies have to catch up with the technology; “We need to support legislation and regulations, including guidance highlighted by the World Economic Forum themselves, to ensure that all of the systems being integrated are secure. This simply must be a foundation of the digital world, not just to avoid malware and attacks, but also to protect intellectual property, plus inhibit cloning and counterfeiting, which is already a $500 billion a year industry.”

IAR, a veteran of embedded systems development tools, entered the security domain with a focus on ensuring digital security was both simple and scalable. “It's always been a trend in technology that unfortunately, we in the tech-industry tend to over complicate things, but we need to make security really simple, and that means securing the device and the software early, what we call Security From Inception” says Richard Lind, CEO of IAR. “With a shortage of over 3 million cybersecurity experts globally many industries are transitioning to tool-based solutions to close this privacy and trust gap. We are helping our customers rapidly meet this challenge, delivering security which is tuned to the legislative requirements, but which can be implemented in hours, not months.”

As a relatively new phenomenon, consumers are largely unaware of the deep-rooted challenges inherent in connected technology. In an increasingly digital world, connected devices need as much security and protection as traditional IT-infrastructure. Which is why IAR makes every effort to mitigate these pitfalls before they can escalate into critical infrastructure failures. “If device security is as an afterthought, there will inevitably be a much larger attack surface for ‘bad actors’ to attack, potentially leading to dangerous malware injections. Security must be integrated directly into the DNA of the product, protecting the devices and consumers, straight off the production line”

In the end, it boils down to making security simple. Simple to integrate into devices, simple to manufacture at scale, and simple to maintain and update across the products life cycle.  

“Developers must be able to consume security and deliver trustworthy products capable of interconnecting, while providing robust authentication and inhibiting attacks. The World Economic Forum has highlighted five critical security requirements for connected devices” tells Lind. “At IAR we are already delivering integrated solutions to our customers, enabling them to meet this global challenge”.

As the threats increase, so security must become increasingly ubiquitous in all our connected systems. IAR is paving the way to the hyper-connected era of IoT by making security both simple and scalable.

The next wave of computing, based on hyperconnectivity and ubiquitous edge computing will inject technology into every aspect of our lives, with privacy and security across the physical worlds and metaverse becoming an increasingly significant challenge for individual and governments. “With increased connectivity in consumer, medical, industrial, and critical infrastructure domains, just how do we guarantee trust and privacy in a hyper-connected world of devices?”, is the question Haydn Povey, Chief Strategy Officer at IAR Systems poses. IAR is the leading global vendor of development tools for embedded systems, the bedrock of the Internet of Things. With 40 years of success, and hundreds of thousands of software developers utilizing their tools for edge-compute systems and device security, they are leading the charge for a more trustworthy connected future.

“The need to transition from an Internet of ‘broken’ Things to an ‘Internet of Trust’ is critical to both achieving device security and increasing consumer confidence in technology”, says Povey. But, in order to get there, governing bodies have to catch up with the technology; “We need to support legislation and regulations, including guidance highlighted by the World Economic Forum themselves, to ensure that all of the systems being integrated are secure. This simply must be a foundation of the digital world, not just to avoid malware and attacks, but also to protect intellectual property, plus inhibit cloning and counterfeiting, which is already a $500 billion a year industry.”

IAR, a veteran of embedded systems development tools, entered the security domain with a focus on ensuring digital security was both simple and scalable. “It's always been a trend in technology that unfortunately, we in the tech-industry tend to over complicate things, but we need to make security really simple, and that means securing the device and the software early, what we call Security From Inception” says Richard Lind, CEO of IAR. “With a shortage of over 3 million cybersecurity experts globally many industries are transitioning to tool-based solutions to close this privacy and trust gap. We are helping our customers rapidly meet this challenge, delivering security which is tuned to the legislative requirements, but which can be implemented in hours, not months.”

As a relatively new phenomenon, consumers are largely unaware of the deep-rooted challenges inherent in connected technology. In an increasingly digital world, connected devices need as much security and protection as traditional IT-infrastructure. Which is why IAR makes every effort to mitigate these pitfalls before they can escalate into critical infrastructure failures. “If device security is as an afterthought, there will inevitably be a much larger attack surface for ‘bad actors’ to attack, potentially leading to dangerous malware injections. Security must be integrated directly into the DNA of the product, protecting the devices and consumers, straight off the production line”

In the end, it boils down to making security simple. Simple to integrate into devices, simple to manufacture at scale, and simple to maintain and update across the products life cycle.  

“Developers must be able to consume security and deliver trustworthy products capable of interconnecting, while providing robust authentication and inhibiting attacks. The World Economic Forum has highlighted five critical security requirements for connected devices” tells Lind. “At IAR we are already delivering integrated solutions to our customers, enabling them to meet this global challenge”.

As the threats increase, so security must become increasingly ubiquitous in all our connected systems. IAR is paving the way to the hyper-connected era of IoT by making security both simple and scalable.

View more videos

IAR - Transition from an Internet of Broken Things to an Internet of Trust

The next wave of computing, based on hyperconnectivity and ubiquitous edge computing will inject technology into every aspect of our lives, with privacy and security across the physical worlds and metaverse becoming an increasingly significant challenge for individual and governments. “With increased connectivity in consumer, medical, industrial, and critical infrastructure domains, just how do we guarantee trust and privacy in a hyper-connected world of devices?”, is the question Haydn Povey, Chief Strategy Officer at IAR Systems poses. IAR is the leading global vendor of development tools for embedded systems, the bedrock of the Internet of Things. With 40 years of success, and hundreds of thousands of software developers utilizing their tools for edge-compute systems and device security, they are leading the charge for a more trustworthy connected future.

“The need to transition from an Internet of ‘broken’ Things to an ‘Internet of Trust’ is critical to both achieving device security and increasing consumer confidence in technology”, says Povey. But, in order to get there, governing bodies have to catch up with the technology; “We need to support legislation and regulations, including guidance highlighted by the World Economic Forum themselves, to ensure that all of the systems being integrated are secure. This simply must be a foundation of the digital world, not just to avoid malware and attacks, but also to protect intellectual property, plus inhibit cloning and counterfeiting, which is already a $500 billion a year industry.”

IAR, a veteran of embedded systems development tools, entered the security domain with a focus on ensuring digital security was both simple and scalable. “It's always been a trend in technology that unfortunately, we in the tech-industry tend to over complicate things, but we need to make security really simple, and that means securing the device and the software early, what we call Security From Inception” says Richard Lind, CEO of IAR. “With a shortage of over 3 million cybersecurity experts globally many industries are transitioning to tool-based solutions to close this privacy and trust gap. We are helping our customers rapidly meet this challenge, delivering security which is tuned to the legislative requirements, but which can be implemented in hours, not months.”

As a relatively new phenomenon, consumers are largely unaware of the deep-rooted challenges inherent in connected technology. In an increasingly digital world, connected devices need as much security and protection as traditional IT-infrastructure. Which is why IAR makes every effort to mitigate these pitfalls before they can escalate into critical infrastructure failures. “If device security is as an afterthought, there will inevitably be a much larger attack surface for ‘bad actors’ to attack, potentially leading to dangerous malware injections. Security must be integrated directly into the DNA of the product, protecting the devices and consumers, straight off the production line”

In the end, it boils down to making security simple. Simple to integrate into devices, simple to manufacture at scale, and simple to maintain and update across the products life cycle.  

“Developers must be able to consume security and deliver trustworthy products capable of interconnecting, while providing robust authentication and inhibiting attacks. The World Economic Forum has highlighted five critical security requirements for connected devices” tells Lind. “At IAR we are already delivering integrated solutions to our customers, enabling them to meet this global challenge”.

As the threats increase, so security must become increasingly ubiquitous in all our connected systems. IAR is paving the way to the hyper-connected era of IoT by making security both simple and scalable.

CyberVerse Advisors

CyberVerse Advisors - The Leading Cyber Advisory Companying Bringing Systems Together
View Video

Harvard Management Company

Harvard Management Company - Getting to Net Zero
View Video

Schoeller Allibert

Schoeller - Using a cradle-to-cradle approach to make returnable packaging more sustainable
View Video

Geopolymer

Geopolymer Solutions - Utilising a Time Tested Process for the Future Health of the Planet
View Video

Li-Cycle

Li-Cycle - Recovering the Value and Materials Within
View Video

Straumann

Straumann Group - Digitalization, entrepreneurship and sustainability to unlock the potential of people’s lives.
View Video

Provivi

Provivi - Developing Pheromone Solutions for Crop Protection
View Video

Boson Energy

Boson Energy - Enabling the Energy Transition with Waste
View Video

AXA Investment Managers

AXA Investment Managers - Working to Value Creation in Real Assets
View Video

Cambridge Associates

Cambridge Associates - Investing for Global Change
View Video

Svante

Svante - The ‘’Picks and Shovels’’ of the Carbon Marketplace
View Video

Eventide

Eventide Asset Management - Leveraging the Power of Capital
View Video

Toom

Toom Baumarkt - the sustainable, one-stop hardware solution for everything DIY
View Video

Henkel

Henkel - Setting the course for tomorrow with a clear sustainability strategy
View Video

Yokoy Group

YOKOY - more than just digitised invoices.
View Video

IAR Systems

IAR - Transition from an Internet of Broken Things to an Internet of Trust
View Video

Palladium Equity Partners

Palladium Equity Partners - Investing for all Stakeholders
View Video

ATOSS

ATOSS Software AG – shaping tomorrow’s working environments
View Video

IWC Schaffhausen

IWC Schaffhausen - A Responsible and Transparent Strategy from a Leading Manufacturer of Luxury Watches
View Video

Borussia Dortmund

Borussia Dortmund - A football club taking on responsibilities
View Video

Africa Finance Corporation

Africa Finance Corporation - Developing a Continent Through Carefully Managed Projects and Initiatives
View Video

Terra Firma

Terra Firma – Rethinking private equity in a changing investment landscape
View Video

RMS

RMS – Actionable risk insights in the era of climate change
View Video

BetterUp

BetterUp – The Democratization of Personalized Coaching
View Video

Lekoil

LekOil – Improving Lives and Adapting to the Changing Priorities of the Energy Market
View Video

Ecor Global

Noble Environmental Technologies – Invents Fiber Alloys® Creating Next Generation Design Materials
View Video

APPLY AND BE PART OF DAVOS 2023

APPLY HERE
Presented By