Implementing Stored-Data Encryption (2014)

Library Content Type:
Publish Date: 
Thursday, April 24, 2014
Event Name: 
Focus Areas:

Data security: top priority re:security breaches, punitive costs. Combined with litigation risks and compliance issues, companies face many products claiming to protect data-at-rest. The storage industry has standardized/deployed technologies to secure stored-data. This tutorial will highlight drive-level self-encryption technology that provides secure foundation and compare with other methods: host-based to controller-based. Self-encryption will be compared to software-based encryption.

Learning Objectives

The mechanics of SEDs, as well as application and database-level encryption
The pros and cons of each encryption subsystem
The overall design of a layered encryption approach