Ma Csec Fundamentals 1540x800 5eceea1d996ef

MACsec Fundamentals: Securing Data in Motion

May 28, 2020
Data must be secured both when at rest and when in motion. MACsec security anchored in hardware at the foundational communication layer (Layer 2) provides that basis of trust for data in motion over Ethernet-based networks.

For end-to-end security of data, it must be secured both when at rest (stored on a connected device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all device security is built. Similarly, MACsec security anchored in hardware at the foundational communication layer (Layer 2) provides that basis of trust for data in motion over Ethernet-based networks.

Sponsored

How to Quickly Leverage Bluetooth AoA and AoD for Indoor Logistics Tracking

Real-time asset tracking is an important aspect of Industry 4.0. Various technologies are available for deploying Real-Time Location.

Free Download: Motor Control For Dummies®

Download this ebook to learn about motor drive motion and control, the importance of the brushless DC motor and it’s influence on new and future motor design. Also, learn how ...

How to effectively implement multi-connectivity asset tracking applications

Using the STEVAL-ASTRA1B development kit, designers can quickly implement asset tracking applications for multiple wireless interfaces with minimal coding.

How to Simplify the Test of CAN Bus Networks Using the Right Oscilloscope

In-vehicle networks (IVNs) allow microcontrollers and engine control units (ECUs) to communicate with sensors, actuators, indicators, displays, and each other. One of the classic...