Implementing Stored-Data Encryption (2014)

webinar

Author(s)/Presenter(s):

Michael Willett

Library Content Type

Presentation

Tutorial

Library Release Date

Focus Areas

Data Governance & Security

Abstract

Data security: top priority re:security breaches, punitive costs. Combined with litigation risks and compliance issues, companies face many products claiming to protect data-at-rest. The storage industry has standardized/deployed technologies to secure stored-data. This tutorial will highlight drive-level self-encryption technology that provides secure foundation and compare with other methods: host-based to controller-based. Self-encryption will be compared to software-based encryption.

Learning Objectives

The mechanics of SEDs, as well as application and database-level encryption
The pros and cons of each encryption subsystem
The overall design of a layered encryption approach