Premium Content

Access "Where encryption fits best"

Published: 01 Nov 2012

There are numerous places to embed encryption into your backup infrastructure. Considering key management and performance issues, here are our recommendations. A tarnished corporate name and possible financial and legal liabilities head the list of management concerns whenever removable disks and tape cartridges holding sensitive information are misplaced or stolen. Encryption can minimize the risks associated with these inevitable occurrences. But with multiple methods available to encrypt data and standards for the long-term management of encryption keys still in their early stages, companies need to proceed cautiously. Encryption secures data and makes it accessible only to those individuals or applications with the proper credentials. Companies may choose to encrypt data in a number of places in the backup infrastructure to satisfy specific application or corporate requirements. For example: Backup software may include an encryption function that encrypts data on the client or on a designated server before storing the data. Encryption appliances install ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
  • Columns
    • Editorial: Web services for storage? It's already happening

      Web services for storage? It's already happening

    • Hot Spots: Web 2.0 storage: Challenges and choices by Bob Laliberte

      Web 2.0 tools and strategies hold many potential benefits for businesses that deploy them, but their requirements for rapidly scalable storage and access, as well as persistent data, pose significant challenges for the IT staffs that need to build and manage the infrastructure.

    • Best Practices: Tackling data migration

      Data center projects often involve migrating data, which is frequently a painful process that can lead to unplanned downtime and outages. It's time to adopt consistent, repeatable migration practices. Selecting the right approach is highly dependent on infrastructure limitations, data and platform types, time constraints and staff capabilities.

    • Storage Bin 2.0: Virtually changing everything

      Server virtualization drives storage growth and dramatically drives the proliferation of storage networking. This is enabling the re-invention of how we manage, protect, store and access information.

More Premium Content Accessible For Free