ABCs of Encryption

Library Content Type:
Publish Date: 
Monday, April 6, 2009
Event Name: 
Focus Areas:

Public disclosures of data indiscretions have become regular enough and embarrassing enough that many organizations are exploring encryption options both to satisfy information protection requirements and to simply stay out of the headlines. Those who have ventured into this space quickly realize that there is no magic crypto fairy dust that will make the problems go completely away. However, with careful planning and judicious use of the right technologies, organizations can eliminate many of their exposures. This session focuses on the efforts required at the storage layer to both create a successful encryption strategy and effectively deploy products that address encryption of data at-rest as well as data in-flight. The session is based on an established step-by-step process that is defined in detail in a SNIA white paper, and also covers recent SNIA work on Best Current Practices.

Learning Objectives

Understand where encryption can applied to the storage layer.
Identify data at-rest encryption prerequisites and opportunities.
Be able to create a process to support encryption that's appropriate to a specific enterprise.