Wireless Infrastructure

04:00 AM
Connect Directly
RSS
E-Mail
50%
50%

Analysis: Enterprise Key Management

If you don't manage encryption--and the keys that it generates--wisely, data will eventually be lost or compromised. We discuss how to keep keys manageable and safe now, and discuss what

 

 

CIOS don't roll out of their beds and think, "Hey, let's sink a few hundred grand into a cohesive enterprisewide encryption infrastructure." Instead, the process is a slow creep, starting with backup tapes and spreading as compliance issues bubble up or we realize that specific applications represent financial liabilities. The result? Layer upon layer of encryption management, replete with multiple key-management challenges.

It's time to stop and think: Will a piecemeal approach to encryption and key management cost us big? Maybe, but you have little choice.

"The bad news is that regulatory pressure is causing us to turn on security from the bottom up," says Benjamin Jun, VP of technology at Cryptography Research. Jun adds that key management is where identity management was five years ago--waiting for the industry to decide on common standards.

Previous
1 of 16
Next
Comment  | 
Print  | 
More Insights
Slideshows
Cartoon
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
Video
Twitter Feed