The growth of machine-to-machine (M2M) communications, wireless financial transactions, and multimedia applications is attracting the attention of thieves and creating new avenues for attack. Data-at-rest protection protocols are a crucial tool for keeping connected systems safe. Green Hills Software’s Embedded Innovator article explains these protocols and shows how you can implement them.
Data-at-rest protection choices differ by layer.
For more articles like this, subscribe to the Embedded Innovator. Subscribers receive a bi-annual magazine and quarterly newsletter with the latest industry trends and design ideas. To learn more about building interoperable, standards-based solutions, visit intel.com/go/embedded-interoperability
Green Hills Software is an Affiliate member of the Intel® Intelligent Systems Alliance.
Roving Reporter (Intel Contractor), Intel® Intelligent Systems Alliance
Editor-In-Chief Embedded Innovator magazine
Follow me on Twitter: @kentonwilliston