Sanity check time: If I own all the L2 links involved (IE between our DC and DR or a service node) there's no point in spinning up IPsec tunnels when I can just use MACsec right? If they are properly ...
For end-to-end security of data and devices, data must be secured both when it as rest (stored on a connected device) and when it is in motion (communicated between connected devices). For data at ...