Display portlet menu

3 Key Requirements to Lock in Security for your Next Design

29 Jun 2017 - 29 Jun 2018



maxim integrated, board

In this webinar, you will learn how hardware-based security offers the most robust protection.

What do video cameras, cars, point-of-sales terminals, and baby monitors have in common? Each has been hacked. In today’s smart, connected world, products we use every day are more vulnerable to cyber-attacks. According to Gartner, 20% of enterprise attacks will involve the IoT in 2020.

But all too often, security remains an afterthought—often because of misconceptions over how much time, effort, and money is required. Get the real scoop by attending our webinar, “3 Key Requirements to Lock in Security for Your Design.” You’ll learn:

  • Why it’s critical to design security in early
  • Why software-based security is misleading
  • How hardware-based security offers the most robust protection
  • How turnkey embedded security delivers the authenticity, confidentiality and integrity that are essential to meeting security requirements without impacting your design cycle.


Reza Ahmadi

Reza Ahmadi
Principal Member of Technical Staff (Maxim Integrated)

Reza joined Maxim in 2009 and since then he has been working on many different Maxim security parts, and supporting Maxim customers. Prior to joining Maxim, Reza held various positions as analog, digital and power electronics design engineer for more than 10 years. He holds a master’s degree in Electrical Engineering from Stanford University.



Display portlet menu


Maxim Integrated banner that reads unleash invisible intelligence with a person touching a clear touch screen in the background

Contest: Unleash Invisible Intelligence

12 Apr 2018 - 12 Jul 2018

The best IoT applications let us monitor things we’ve never dreamed of monitoring. We’re challenging you to come up with creative ways to infuse intelligence into a new application using the MAX32620FTHR rapid development platform.