The growth of machine-to-machine (M2M) communications, wireless financial transactions, and multimedia applications is attracting the attention of thieves and creating new avenues for attack. Data-at-rest protection protocols are a crucial tool for keeping connected systems safe. This paper discusses how to apply modern data-at-rest protection protocols to intelligent systems.