Dedicated accelerator hardware for artificial intelligence and machine learning algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle important data which has value and must be protected. Many security threats exist that can compromise these assets. Fortunately, there are security techniques which can mitigate these threats.

Part 3 of this webinar series will answer the following questions:

  • What are the challenges of implementing security in software?
  • How can the security building blocks be implemented in hardware?
  • How can threats to AI/ML accelerators be countered with a hardware Root of Trust?
  • How does the CryptoManager Root of Trust provide robust security for AI/ML accelerators?

Complete the form to watch the webinar.

 

Watch more in the Implementing Strong Security for AI/ML Accelerators series:

Part One
Part Two