Managing Encryption Keys: Best Practices for Ensuring Data Recoverability

  • Source: CipherMax
  • Written By:
  • Published:
  • (Originally Published On:) )
Heightened awareness of vulnerabilities in sensitive stored data has resulted in the increased application of encryption technology. To secure data at rest, a well-defined process for handling the keys used to encrypt data—as well as the keys used to safeguard the data encryption keys—is essential. With the proper key management controls in place, companies can ensure that data is effectively secured and recoverable.

Featured Software Research:

Expert’s Guide to Successful MRP Projects

To succeed in their tasks, planners and schedulers rely on materials resource planning (MRP) software to make recommendations and send signals. To make meaningful suggestions, MRP requires a steady diet of accurate, relevant, and timely data. This guide breaks down two critical MRP project success factors: 1) tips to select the right MRP software, and 2) best practices to extract meaningful value from MRP solutions. Read More

Best Practices for Managing Just-in-time (JIT) Production

Just-in-time (JIT) manufacturing “is not procrastination, but making a commitment once the scales are tipped in the favor of certainty.” How do you keep your company from falling prey to the “deer-in-the-headlights” syndrome and suffering from decision failures? In this guide, experts share their top seven best practices for deftly managing JIT manufacturing. Read More

2014 Professional Services Maturity Benchmark Best of the Best

According to “The 2014 Professional Services Maturity Benchmark,” out of 238 participating organizations, 13 firms significantly outperformed the average, excelling in five service performance dimensions: leadership, client relationships, human capital alignment, service execution, and finance and operations. This white paper focuses on one of this year’s best service organizations and the best practices that differentiate the best of the best from average firms. Read More

You may also be interested in these related documents:

Choosing a Key Management Solution

The modern enterprise deploys a variety of server platforms, operating systems, and programming languages. A major barrier to deploying encryption has been the challenge of accessing encryption keys from these widely divergent environments. This paper helps define the key management needs of your enterprise, while defining the elements necessary to reduce the technical challenges and cost of deployment. Read More

NIST Certification for AES Encryption

The National Institute of Standards and Technology (NIST) defines the standard for Advanced Encryption Standard (AES) encryption, and provides a rigorous testing process for software vendors. The AES certification process tests every aspect of encryption and involves millions of operations. Discover a solution that has achieved AES validation for all key sizes and modes of operation, on every major enterprise platform. Read More

PC Encryption: Eyes Wide Open

While the virtues of encrypting PC data are extolled by vendors and the press alike, some painful truths go largely unmentioned. Whether necessary for compliance or state breach disclosure law, or for doing business in a state requiring it, encryption is necessary but difficult. Learn where existing encryption solutions are failing, and find out how emerging tools and trends can make encryption better, and easier. Read More
 
comments powered by Disqus