Abstract
Security has always been a critical aspect of IT Storage. Until recently physical security and other administrative policies were often sufficient to establish security for data centers and corporate information. The current set of regulations combined with the need to access data by more applications, devices and locations makes past security techniques ineffective.
This presentation examines practical steps and technologies available to solve the need to maintain security for sensitive data without impacting application or users. An overview of security choices is presented, along with recommendations for establishing practical security practices that can be integrated into typical IT environments. Securing data in both public and private infrastructure is covered, with an examination of the issues around securing Cloud and other storage services.
This session will focus on implementing successful security policies that ensure data is secured whenever it is transmitted or stored. Issues such as when and where to encrypt data, products to use and the all-important key-management question are addressed.
Learning Objectives
Overview of storage security, key management and trends
Best practices for enterprise key management to ensure regulatory compliance
Ways to implement security without impacting business operations