We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest! Update Here
Stay in the loop with the latest from Microchip! Update your profile while you are at it. Update Here
Complete your profile to access more resources.Update Here!
Item Qty
Your cart is empty.

Reliable and Secure Connectivity


In connected product design, security is a requirement, not an option. Securing your product can be challenging because:

  • New threats are emerging
  • Regulations are changing
  • Requirements are complicated

You need a reliable, reputable provider that will help you to navigate the complexities of modern security requirements. Our wireless products are built and maintained with security in mind. We keep your designs secure through:

  • Multiple layers of protection
  • Continual updates to address new and evolving threats
  • Tools and resources to navigate security regulations

Read on to learn more about our security features and vulnerability response.

Three Layers of Wireless Product Security

Layered Security Solutions


There are three layers of security in wireless devices. The first two levels are integrated into the product, with an optional third level that can be added to applications that require extra protection.

Our commitment to security goes beyond wireless products. As an end-to-end solution provider, we can help you secure all aspects of your design. Learn more about our security solutions.

Semiconductor Chip Icon

Level 1: On-Chip Security

Features like secure boot and the ability to update software Over The Air (OTA) are integrated into the chip.

Wi-Fi Icon

Level 2: Local Wireless Security

Features that secure the chip’s wireless transmissions include AES encryption and WPA3. Local security features are listed in product data sheets.

Cloud Icon

Level 3: Cloud Security

Our industry-leading Trust Platform offers a range of options for securing cloud connections.

Vulnerability Response


If a vulnerability is discovered in any of our products, tools, software or firmware, our Product Security Incident Response Team (PSIRT) is set up to ensure that the vulnerability is mitigated and communicated responsibly.

Security Resources


Radio Equipment Directive (RED)

Learn more about RED and get answers to frequently asked questions.

Webinars

Learn about new developments for safeguarding your designs.

Blog Posts

Stay up to date on the latest trends with our in-depth articles.

Learn the Fundamentals of Cryptography


Cryptography Primer Course

In this Microchip University course, you will learn about symmetric and asymmetric cryptography, including real-world examples. After completing this modular course, you will understand how identity is created and used for authentication, integrity and confidentiality.

Cryptography Primer Course