There are three layers of security in wireless devices. The first two levels are integrated into the product, with an optional third level that can be added to applications that require extra protection. Our commitment to security goes beyond wireless products. As an end-to-end solution provider, we can help you secure all aspects of your design. Learn more about our security solutions.
Features like secure boot and the ability to update software Over The Air (OTA) are integrated into the chip.
Features that secure the chip’s wireless transmissions include AES encryption and WPA3. Local security features are listed in product data sheets.
Our industry-leading Trust Platform offers a range of options for securing cloud connections.
If a vulnerability is discovered in any of our products, tools, software or firmware, our Product Security Incident Response Team (PSIRT) is set up to ensure that the vulnerability is mitigated and communicated responsibly.
Learn more about RED and get answers to frequently asked questions.
In this Microchip University course, you will learn about symmetric and asymmetric cryptography, including real-world examples. After completing this modular course, you will understand how identity is created and used for authentication, integrity and confidentiality.