Home > Vendors >

IAR Systems

We are dedicated to provide superior technology and services, enabling our customers to create the products of today and the innovations of tomorrow.

Containerized, cloud-enabled, and compliant: embedded DevSecOps at scale

As embedded systems evolve and development scales across teams and geographies, maintaining quality, security, and compliance becomes a serious challenge. Manual workflows and fragmented toolchains no longer meet the demands of modern product development, especially when time-to-market and regulatory readiness are critical.

In this session, we’ll explore how engineering teams are implementing DevSecOps best practices to automate embedded CI/CD pipelines, reduce risk, and deliver secure, high-quality software, whether deploying in cloud, hybrid, or on-prem environments.

You’ll learn how containerized, cloud-enabled workflows help:

  • Support compliance with standards like ISO 26262, IEC 61508, and IEC 62304 using TÜV-certified tools
  • Integrate secure boot, encryption, and IP protection directly into development pipelines
  • Adopt architecture-agnostic toolchains across Arm, RISC-V, and more, minimizing vendor lock-in
  • Enable CI/CD automation using familiar tools like GitHub, GitLab, Kubernetes, and containers

Whether you're building safety-critical devices or scaling across multiple product lines, this session offers real-world strategies that embedded software teams are using today to modernize, secure, and accelerate development across any deployment model.

Go to Session


The 1-Hour Security Bootcamp

How do you keep your company from being front page news for the wrong reasons? You can start by implementing a rigorous security solution on your embedded devices. The most common reason developers give for not using security is that they perceive it to be too hard, so they will just sit back until they are forced to imbue their devices with security by either their customers or the government... or until they get hacked and shamed. Good security is hard, but with the right tools, it doesn't have to be that way. In this session, we're going to take a holistic approach to implementing security by examining the Chain of Trust, hardware requirements, and working in a secure workflow to minimize the attack surface a hacker can use to attack your system. We're going to show you how easy it can be to enable a high degree of security in just a few easy steps.

Go to Session


Working with custom ISA extensions in RISC-V

One of the major benefits of using RISC-V is the flexibility the architecture provides, which enables OEMs as well as SoC vendors to design custom cores with the exact definitions needed for the application or product. The fact that you can add any instruction you need provides full flexibility for innovation and differentiation without compromising code quality or performance. These application-specific instructions (custom ISA extensions) is enabled through the .insn directive. In this webinar your will learn how to make use of your custom extensions in the development of your RISC-V based application.

Go to Session


Working with custom ISA extensions in RISC-V

One of the major benefits of using RISC-V is the flexibility the architecture provides, which enables OEMs as well as SoC vendors to design custom cores with the exact definitions needed for the application or product. The fact that you can add any instruction you need provides full flexibility for innovation and differentiation without compromising code quality or performance. These application-specific instructions (custom ISA extensions) is enabled through the .insn directive. In this webinar your will learn how to make use of your custom extensions in the development of your RISC-V based application.

Go to Session