Article: Modern Data Protection for Intelligent Systems

Version 1

    The growth of machine-to-machine (M2M) communications, wireless financial transactions, and multimedia applications is attracting the attention of thieves and creating new avenues for attack. Data-at-rest protection protocols are a crucial tool for keeping connected systems safe. Green Hills Software’s Embedded Innovator article explains these protocols and shows how you can implement them.



    Data-at-rest protection choices differ by layer.


    interoperability.pngFor more articles like this, subscribe to the Embedded Innovator. Subscribers receive a bi-annual magazine and quarterly newsletter with the latest industry trends and design ideas. To learn more about building interoperable, standards-based solutions, visit


    Green Hills Software is an Affiliate member of the Intel® Intelligent Systems Alliance.



    Kenton Williston

    Roving Reporter (Intel Contractor), Intel® Intelligent Systems Alliance

    Editor-In-Chief Embedded Innovator magazine

    Follow me on Twitter: @kentonwilliston