• 04/27/2007
    4:00 AM
  • Network Computing
  • News
  • Connect Directly
  • Rating: 
    0 votes
    Vote up!
    Vote down!

Analysis: Enterprise Key Management

If you don't manage encryption--and the keys that it generates--wisely, data will eventually be lost or compromised. We discuss how to keep keys manageable and safe now, and discuss what


CIOS don't roll out of their beds and think, "Hey, let's sink a few hundred grand into a cohesive enterprisewide encryption infrastructure." Instead, the process is a slow creep, starting with backup tapes and spreading as compliance issues bubble up or we realize that specific applications represent financial liabilities. The result? Layer upon layer of encryption management, replete with multiple key-management challenges.

It's time to stop and think: Will a piecemeal approach to encryption and key management cost us big? Maybe, but you have little choice.

"The bad news is that regulatory pressure is causing us to turn on security from the bottom up," says Benjamin Jun, VP of technology at Cryptography Research. Jun adds that key management is where identity management was five years ago--waiting for the industry to decide on common standards.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.

Log in or Register to post comments