Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analysis: Enterprise Key Management: Page 3 of 16

Companies just starting on the road to ubiquitous encryption should launch an EKM project before the number of disparate systems is overwhelming, and ensure new products are compatible with their strategies instead of trying to bolt on support later. Those who've adopted encryption on an ad hoc basis must realize that security is only as strong as its weakest link: If we can't handle our keys, eventually we will lose access to sensitive data, or worse, turn it loose and suffer the consequences.

Continue Reading This Story...

IMAGES
Click image to view image


NWC REPORTS

bulletDownload a PDF of this article at NWC Reports.
Encryption's buzzword status only grows with each revelation of sensitive corporate information gone missing. Are vendor's products keeping pace with their products? We analyze several key management offerings

AROUND THE WEB
bulletHost Intrusion Prevention
How does host IPS compare with conventional antivirus solutions? What's the difference between network IPS and host IPS? Examine host IPS in this report based on an exclusive survey of enterprise users and
in-depth lab analysis.

The State We're In

Given recent harrowing data breaches, we expected most enterprises would be working hard to build cohesive encryption plans. Not so, according to a recent Ponemon Institute study, which found that though 66 percent of 768 U.S. IT pros surveyed have some encryption strategy, only 16 percent are taking an enterprisewide approach.

That's partly because encryption drivers are diverse, from government and industry regulations, to contractual obligations, to auditor demands, to internal policies that too often cast a cynical eye toward the safe-harbor provisions written into mandatory disclosure laws. What should not be diverse, however, is your strategy for managing encryption keys. Key management is important not just because compliance officers want to know how keys are generated, stored and destroyed, but because data may be irretrievably lost if keys are mishandled. The need for a centralized key-management strategy will grow in importance as a company's encryption needs increase.