Cable-Tec Expo 2019

Study in Difference Between HW and SW Enabled Security (Room 221-222)

Dive into the different applications of security when using hardware and software. There are many approaches for protecting critical assets and remediating critical vulnerabilities.  This workshop explores examples of two different methods of implementing security solutions.  The first idea introduces BGP Resource Public Key Infrastructure (RPKI), which uses public key cryptography to securely validate the ownership of IP resources. The second example explores solutions to address the security gaps created by a growing demand for quickly deployable and securely protected applications.