Premium Content

Access "Where encryption fits best"

Published: 01 Nov 2012

There are numerous places to embed encryption into your backup infrastructure. Considering key management and performance issues, here are our recommendations. A tarnished corporate name and possible financial and legal liabilities head the list of management concerns whenever removable disks and tape cartridges holding sensitive information are misplaced or stolen. Encryption can minimize the risks associated with these inevitable occurrences. But with multiple methods available to encrypt data and standards for the long-term management of encryption keys still in their early stages, companies need to proceed cautiously. Encryption secures data and makes it accessible only to those individuals or applications with the proper credentials. Companies may choose to encrypt data in a number of places in the backup infrastructure to satisfy specific application or corporate requirements. For example: Backup software may include an encryption function that encrypts data on the client or on a designated server before storing the data. Encryption appliances install ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

  • Columns
    • Editorial: Web services for storage? It's already happening

      Web services for storage? It's already happening

    • Hot Spots: Web 2.0 storage: Challenges and choices by Bob Laliberte

      Web 2.0 tools and strategies hold many potential benefits for businesses that deploy them, but their requirements for rapidly scalable storage and access, as well as persistent data, pose significant challenges for the IT staffs that need to build and manage the infrastructure.

    • Best Practices: Tackling data migration

      Data center projects often involve migrating data, which is frequently a painful process that can lead to unplanned downtime and outages. It's time to adopt consistent, repeatable migration practices. Selecting the right approach is highly dependent on infrastructure limitations, data and platform types, time constraints and staff capabilities.

    • Storage Bin 2.0: Virtually changing everything

      Server virtualization drives storage growth and dramatically drives the proliferation of storage networking. This is enabling the re-invention of how we manage, protect, store and access information.

More Premium Content Accessible For Free

  • Big data storage challenges: Speed, capacity and HDFS integration

    Big data infrastructure and analytics are some of the hottest technology topics today, and it can sometimes seem impossible to dissect and digest all...

  • Moving target: Endpoint backup

    Mobile workers are now accessing, creating and modifying data on ultra-portable devices such as smartphones, tablets and phablets. Most companies ...

  • A lesson in flash caching

    Solid-state storage is proliferating as a replacement for hard disk drives, where it offers a quick shift into the fast lane of storage processing. ...