Guidelines for Effective Encryption Key Management Podcast
reduce hardware costs, lower operational costs, minimize the IT footprint, - See more at: http://townsendsecurity.com/products/virtualized-encryption-key-management#sthash.GGZ6jurE.dpuf
reduce hardware costs, lower operational costs, minimize the IT footprint, - See more at: http://townsendsecurity.com/products/virtualized-encryption-key-management#sthash.GGZ6jurE.dpuf
reduce hardware costs, lower operational costs, minimize the IT footprint, - See more at: http://townsendsecurity.com/products/virtualized-encryption-key-management#sthash.GGZ6jurE.dpuf

art144

As more enterprises begin to outsource hosting and move confidential data to the cloud, the protection of encryption keys become the number one action that determines the true effectiveness of their encryption strategy.

In this podcast, Patrick Townsend discusses:


  • The information security CIA triad (confidentiality, integrity, and availability)
  • How it relates to encryption key management
  • What compliance regulations say about managing encryption keys
  • How encryption and key management arm enterprises with a strong, defense-in-depth approach to data security
  

Download "Guidelines for Effective Encryption Key Management" Podcast