For end-to-end security of data, it must be secured both when at rest (stored on a connected device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all device security is built. Similarly, MACsec security anchored in hardware at the foundational communication layer (Layer 2) provides that basis of trust for data in motion over Ethernet-based networks.
Download the white paper to:
- The benefits of Layer 2 security with MACsec
- Use cases for MACsec
- MACsec properties and the protocol process
Complete the form to get your download.