We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X

Need Help?

Privacy Policy

Live Chat

Security is no longer an option; it is a requirement. We are your trusted provider of embedded security solutions. Our comprehensive security solutions give you many options to address your specific threat models.

Three Pillars of a Secure System


The following features are essential for securing systems:

Authentication

The ability to prove someone’s or something’s identity is real

Integrity

Ensuring that content has not been manipulated

Confidentiality

Assurance that no unintended entities can read data at rest and/or messages during transmission

Properties of a Secure System


Explore Our Education, Prototyping and Provisioning Design Suite


The objective of our Trust Platform provisioning service is to isolate credentials from being exposed any time during and after production while eliminating the need for you to have extensive knowledge about handling and securing keys.

Additional Resources for Embedded Security


Reference Designs for Security

Blog Posts for Security

Case Studies for Security

Microchip University Security Courses


Security Webinars


Join our security experts and partners to learn about the latest trends and new developments for safeguarding your designs.

Design Partners for Security


Get in touch with one of our Design Partners if you want assistance with implementing security technology in your next design.

Microchip's Coordinated Vulnerability Disclosure Process


In the event of the discovery of a vulnerability in any of our products, tools, software or firmware solutions, our Product Security Incident Response Team (PSIRT) is set up to ensure that the vulnerability is mitigated and communicated responsibly. Use the link below to follow our coordinated disclosure process to report your findings.

Explore Our Security Product Portfolio


There are many options for adding security to embedded designs, so we offer a variety of flexible and complementary solutions. Use these links to learn about our comprehensive portfolio of security ICs and security-focused microcontrollers (MCUs), microprocessors (MPUs) and Field-Programmable Gate Arrays (FPGAs). You’ll also find links to software libraries, enhanced protocols, development kits, training and other resources to help you start building your secured solution today.