Data protection services and strategies for enterprise CIOsTools and Technologies: Data protection software and systems <<previous|next>> :Identity access management compliance: Consider roles people play
Encryption no longer an optional technology
01 Oct 2008 | SearchSecurity.com
Unravel the ins and outs of how your organization should deploy encryption.
Consequently, it is no longer a question of whether a company should use encryption, but rather how a company should encrypt data. The first step in planning an encryption strategy is to understand the primary types of available encryption solutions: storage, network encryption and application-level. While each offers benefits, there are also drawbacks to take into account.