Abstract
Data security: top priority re:security breaches, punitive costs. Combined with litigation risks and compliance issues, companies face many products claiming to protect data-at-rest. The storage industry has standardized/deployed technologies to secure stored-data. This tutorial will highlight drive-level self-encryption technology that provides secure foundation and compare with other methods: host-based to controller-based. Self-encryption will be compared to software-based encryption.
Learning Objectives
The mechanics of SEDs, as well as application and database-level encryption
The pros and cons of each encryption subsystem
The overall design of a layered encryption approach