Home
 > Research and Reports > White Papers > Managing Encryption Keys: Best Practices for Ensuring...

Managing Encryption Keys: Best Practices for Ensuring Data Recoverability

Source: CipherMax
Heightened awareness of vulnerabilities in sensitive stored data has resulted in the increased application of encryption technology. To secure data at rest, a well-defined process for handling the keys used to encrypt data—as well as the keys used to safeguard the data encryption keys—is essential. With the proper key management controls in place, companies can ensure that data is effectively secured and recoverable.


Featured publications:

Best Practices for Managing Just-in-time (JIT) Production
Source: Ziff Davis Just-in-time (JIT) manufacturing “is not procrastination, but making a commitment once the scales are tipped in the favor of certainty.” How do you keep your company from falling prey to the “deer-in-the-headlights” syndrome and suffering from decision failures? In this guide, experts share their top seven best practices for deftly managing JIT manufacturing. Read More...
Comparing the Total Cost of Ownership of Business Intelligence Solutions
Source: Birst For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions. Read More...
Go Daddy: Best Practices on Validating Storage Performance
Source: Load DynamiX Learn how Go Daddy accelerated new storage technology adoption, decreased risk by ensuring SLAs, and reduced costs by 50% for its 30 PBs of hosting data. The new storage validation process empowers Go Daddy with the insight to optimize both service delivery and vendor selection. Read More...


You may also be interested in these related documents:

Choosing a Key Management Solution
Source: Patrick Townsend Security Solutions The modern enterprise deploys a variety of server platforms, operating systems, and programming languages. A major barrier to deploying encryption has been the challenge of accessing encryption keys from these widely divergent environments. This paper helps define the key management needs of your enterprise, while defining the elements necessary to reduce the technical challenges and cost of deployment. Read More...
NIST Certification for AES Encryption
Source: Patrick Townsend Security Solutions The National Institute of Standards and Technology (NIST) defines the standard for Advanced Encryption Standard (AES) encryption, and provides a rigorous testing process for software vendors. The AES certification process tests every aspect of encryption and involves millions of operations. Discover a solution that has achieved AES validation for all key sizes and modes of operation, on every major enterprise platform. Read More...
PC Encryption: Eyes Wide Open
Source: Beachhead Solutions While the virtues of encrypting PC data are extolled by vendors and the press alike, some painful truths go largely unmentioned. Whether necessary for compliance or state breach disclosure law, or for doing business in a state requiring it, encryption is necessary but difficult. Learn where existing encryption solutions are failing, and find out how emerging tools and trends can make encryption better, and easier. Read More...

 
comments powered by Disqus



Recent Searches
Others A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

©2014 Technology Evaluation Centers Inc. All rights reserved.