Securing Ethernet-APL Industrial End Nodes
Learn how ADI’s secure authenticators support countermeasures to protect against cyber threats.
Video Player is loading.
Current Time 0:00
Duration 0:00
Loaded: 0%
Stream Type LIVE
Remaining Time 0:00
 
1x
  • Chapters
  • descriptions off, selected
  • captions off, selected

    Securing Ethernet-APL Industrial End Nodes

    Jan 30 2025

    Industrial Ethernet within factories and process plants is enabling seamless edge to cloud connectivity, bringing increased bandwidth and access to insights as well as greater exposure to new potential threats from cyberattacks. A heightened level of cybersecurity vulnerability needs to be considered in today’s connected factories. Ethernet brings IP addressability to all edge nodes and removes the need for gateway devices. This presentation outlines the security countermeasures and implementation challenges for edge nodes and how ADI’s secure authenticator portfolio supports these countermeasures to protect resources and power constrained industrial end nodes against cyber threats.

    Securing Ethernet-APL Industrial End Nodes
    Learn how ADI’s secure authenticators support countermeasures to protect against cyber threats.
    Video Player is loading.
    Current Time 0:00
    Duration 0:00
    Loaded: 0%
    Stream Type LIVE
    Remaining Time 0:00
     
    1x
    • Chapters
    • descriptions off, selected
    • captions off, selected

      Securing Ethernet-APL Industrial End Nodes

      Jan 30 2025

      Industrial Ethernet within factories and process plants is enabling seamless edge to cloud connectivity, bringing increased bandwidth and access to insights as well as greater exposure to new potential threats from cyberattacks. A heightened level of cybersecurity vulnerability needs to be considered in today’s connected factories. Ethernet brings IP addressability to all edge nodes and removes the need for gateway devices. This presentation outlines the security countermeasures and implementation challenges for edge nodes and how ADI’s secure authenticator portfolio supports these countermeasures to protect resources and power constrained industrial end nodes against cyber threats.