Securing Ethernet-APL Industrial End Nodes
Learn how ADI’s secure authenticators support countermeasures to protect against cyber threats.
Video Player is loading.
Current Time 0:00
Duration 18:55
Loaded: 0.00%
Stream Type LIVE
Remaining Time 18:55
 
1x
  • Chapters
  • descriptions off, selected
  • subtitles off, selected
  • en (Main), selected

Securing Ethernet-APL Industrial End Nodes

2025-01-30

Industrial Ethernet within factories and process plants is enabling seamless edge to cloud connectivity, bringing increased bandwidth and access to insights as well as greater exposure to new potential threats from cyberattacks. A heightened level of cybersecurity vulnerability needs to be considered in today’s connected factories. Ethernet brings IP addressability to all edge nodes and removes the need for gateway devices. This presentation outlines the security countermeasures and implementation challenges for edge nodes and how ADI’s secure authenticator portfolio supports these countermeasures to protect resources and power constrained industrial end nodes against cyber threats.

Securing Ethernet-APL Industrial End Nodes
Learn how ADI’s secure authenticators support countermeasures to protect against cyber threats.
Video Player is loading.
Current Time 0:00
Duration 18:55
Loaded: 0.00%
Stream Type LIVE
Remaining Time 18:55
 
1x
  • Chapters
  • descriptions off, selected
  • subtitles off, selected
  • en (Main), selected

Securing Ethernet-APL Industrial End Nodes

2025-01-30

Industrial Ethernet within factories and process plants is enabling seamless edge to cloud connectivity, bringing increased bandwidth and access to insights as well as greater exposure to new potential threats from cyberattacks. A heightened level of cybersecurity vulnerability needs to be considered in today’s connected factories. Ethernet brings IP addressability to all edge nodes and removes the need for gateway devices. This presentation outlines the security countermeasures and implementation challenges for edge nodes and how ADI’s secure authenticator portfolio supports these countermeasures to protect resources and power constrained industrial end nodes against cyber threats.