Premium Content

Access "Get a grip on encryption keys"

Published: 22 Oct 2012

As locking up data becomes common in more enterprises, keeping track of encryption keys is turning into storage managers' next big headache. Various encryption methods have spawned numerous keys that need to be kept safe, rotated and retired appropriately. With disparate key management systems throughout the data center, it's easy to end up with a piecemeal approach to encryption and siloed key management. But vendors are jumping on board with related products, and an emerging standard promises to ease encryption key management. Leading the pack is RSA, EMC's security division, which in April released RSA Key Manager (RKM) for the Datacenter, the latest version of its enterprise key manager product. The product aims to centralize key management with support for a variety of encryption methods and apps, including Oracle 11g, EMC PowerPath, SAN encryption and tape encryption. RSA announced partnerships with Cisco and Brocade earlier this year. Katie Curtin-Mestre, director of product marketing for the data security group at RSA, compares encryption to ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

  • Columns
    • Storage Bin 2.0: The life and death of information

      We sometimes complicate our processes to create a perception of increased value. Forget information lifecycle management and tiered storage; concentrate on the four simple stages of life for any kind of information.

    • Get your iSCSI game on: Best Practices by Ashish Nadkarni

      iSCSI is a mature protocol for accessing storage and a solid alternative to Fibre Channel. Technologies such as blade servers and server virtualization benefit from iSCSI as it lets you minimize the number of connections required. And because everything is IP-based, there's no more need to waste slots for host bus adapters, which simplifies your configuration.

    • The big pipe: Editorial

    • Backup gets a boost: Hot Spots by Lauren Whitehouse

      Snapshots, continuous data protection and deduplication are making their way into traditional backup products. By capturing, transferring and storing less data in the backup process, organizations can back up more data to disk--retaining data on disk for longer periods of time or enabling disk-to-disk backup for more sets of data than before.

More Premium Content Accessible For Free