Results tagged "encryption"
Total Search Results : 112
April 02, 2013 12:29 PMSome enterprises are adopting an "encrypt everything" policy to address the confidentiality and security of data, including on backups. A new backup product from Sepaton separates encryption from key management.
January 18, 2013 10:43 AMNot every idea that comes out of the storage industry is a good one. Here are three developments in storage encryption, patents and holographic storage that have got me scratching my head.
December 04, 2012 03:03 PMGot e-discovery, data destruction or outdated hardware woes? Digital shredding may be the solution — and it can bolster the business case for encrypting data.
October 31, 2012 02:53 PMPorticor's Virtual Private Data service encrypts information stored in private and public clouds, and uses homomorphic encryption techniques to protect master keys.
July 27, 2012 12:13 PMIn 2011, data storage management was all about centralization and consolidation. Now, the tide has turned to data reliability, security and performance. Learn why.
April 24, 2012 09:00 AMConcern about the security of cloud-based data is a big issue for enterprises. Several technology companies, now joined by Certes, are trying to allay customer concerns about data security by giving them control of the keys that protect their data in the cloud.
February 23, 2012 01:00 PMSeveral months ago, an IT trade publication (which will remain nameless) published an article whose title stated that public cloud security remains "mission impossible." While the article was well-reasoned and backed off from the title's hyperbolic assertion, the damage had already been done. Actually, the title should have been something more like, "Public cloud security is mission possible, but proceed cautiously."
February 08, 2012 01:00 PMThe ever-growing mobile workforce with its head in the cloud has created what seems like an endless list of IT challenges to overcome, and with anywhere, anytime access to information a necessity for many enterprises, the new IT world is having an impact on the kind of encryption enterprises need to protect their sensitive and proprietary data.
February 07, 2012 11:00 AMWith data access no longer restricted to the four walls of the enterprise (or branch) and 9-to-5 business hours, enterprises that have traditionally relied on a perimeter-based approach to security are now seeing the benefits of a data-centric approach. Data encryption is paving the way for the transition to data-centric security methods, according to a survey of 506 IT professionals.
October 28, 2011 02:20 PMCustomers looking for more performance and security in their branch operations should find the plug-and-play Cisco VPN Internal Service Module for the ISR G2 family very attractive, especially for the public sector, say company officials. The compact VPN blade provides up to three times better throughput for IPSec VPN encrypted traffic, as well as support for the latest encryption standards. These include stronger NSA-regulated encryption algorithms such as Suite-B, which has been selected for use by the U.S. government.
Best of the Web
VXLAN is an Experimental IETF draft of protocols to enable the creation of a large overlay, multi-tenant network.
: OpenFlow is poised to reach over-hyped status, yet there are practical, useful reasons for keeping an eye on Openflow. The biggest cloud players are involved and driving the feature creation.
Get a primer on the Openflow protocol and what it can do for networking.