Premium Content

Access "Getting started with encryption key management"

Published: 30 Oct 2012

What you need to know about encryption key management If encryption isn't in your shop yet, it will be soon. Learn how to manage it before it's too late. Three years ago, storage encryption generated more head scratching than interest. Storage was assumed to be a technology layer hidden behind well-protected server hardware and OSes. Encryption was a topic for intelligence agencies, math gurus and networking professionals, but not the storage team. That mindset seems quaint today. When it comes to storage encryption, we now know the following: Users get it. Between February 2005 and July 2006, there were 17 publicly disclosed data breaches, according to the Privacy Rights Clearinghouse. More than 9 million Americans had their personal information exposed in these breaches. Given the potential cost and damage of a publicly disclosed data breach, storage professionals are evaluating and purchasing tape encryption solutions in record numbers. Vendors are responding. Last year, Network Appliance bought Decru, while NeoScale Systems signed on as a partner with ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free