Data Encryption and Key Management, Part I & II

Library Content Type:
Publish Date: 
Monday, October 11, 2010
Event Name: 
Focus Areas:

We hear every month of another cyber attack, hacking event or just plain data theft where thousands to millions of data records are exposed. A number of techniques are available that can minimize the data exposure risk in these cases but they all involve some form of data-at-rest-security. We discuss the many different approaches to secure data-at-rest in your IT shop.

Learning Objectives

Understand the many ways to provide data-at-rest security for block and file data.
Understand the implications of various approaches to data-at-rest security with respect to key management, storage performance, and cost