In this technical deep dive, Emil Isaakian will explain the details of the protocol, cryptography, key management and vulnerabilities mitigated by MACSec/ESS. Additionally he’ll show use cases to show how to succesfully deploy MACSec/ESS technologies (Network Encryptors + NVF) to protect your WAN (MPLS, PBBN, Carrier Ethernet), LAN and cloud infrastructure.
Protecting Data & Applied Crypto
data security encryption strategy & trends key management network security cryptography
Share With Your Community