Ma Csec Fundamentals 1540x800 5eceea1d996ef

MACsec Fundamentals: Securing Data in Motion

May 28, 2020
Data must be secured both when at rest and when in motion. MACsec security anchored in hardware at the foundational communication layer (Layer 2) provides that basis of trust for data in motion over Ethernet-based networks.

For end-to-end security of data, it must be secured both when at rest (stored on a connected device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all device security is built. Similarly, MACsec security anchored in hardware at the foundational communication layer (Layer 2) provides that basis of trust for data in motion over Ethernet-based networks.

Sponsored

A Designer's Guide to Lithium (Li-ion) Battery Charging

This designer's guide helps you discover how you can safely and rapidly charge lithium (LI-ion) batteries to 20%-70% capacity in about 20-30 minutes.

Getting Started with STM32LF Discovery Kit IoT Node

Learn about STs IoT Discovery Kit Node.

The Basics of Current Sensors

This article describes the advantages of open-loop sensors over closed-loop current sensors. Examples of LEM and Honeywell open-loop sensors are described.

STM32WBA - 2.4GHz wireless microcontroller with SESIP Level 3 security

The STM32WBA 32-bit Wireless series brings designers the performance, efficiency, and security required for Bluetooth® Low Energy 5.3-enabled applications.