Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analysis: Enterprise Key Management: Page 7 of 16

The magic word there? Policies.

The key to encryption (pun intended) is to protect access to data. It doesn't make sense to allow different people access to the same data based on its location. Why should network engineers have access to keys when data is traversing the VPN, the mail-server administrators have access while data is encrypted in the mail server, and the user have access when it's encrypted on his laptop?

The security industry is pushing policy compliance and policy-driven security hard--NAC demonstrates this trend--and products that follow directly from corporate policies are needed for data encryption too. Data security standards must be written first, and then we need security mechanisms to implement consistent protection measures based on those standards, no matter where the data resides.

Unfortunately, that's impossible with a silo approach, where every product or piece of the network has its own encryption mechanisms.

So What's The Solution?