News Stay informed about the latest enterprise technology news and product updates.

Encryption: Building to code

Data protection mandates in legislation like HIPAA and the Sarbanes-Oxley Act are making encryption more popular, but cryptography as a point solution is another story.

Data protection mandates in legislation like HIPAA and the Sarbanes-Oxley Act are making encryption more popular,...

but cryptography as a point solution is another story.

Enterprises "aren't going out and searching for what product can solve everything out of the box," explains Adam K. Erickson, senior VP of worldwide sales and marketing for encryption middleware provider Eruces. "Rather, what they're tending to do is develop their own solutions in-house."

But it takes time and skill to build encryption from scratch -- more than some companies can afford.

Last month Eruces rolled out the platform-independent Encryption Framework for Enterprises, which leverages its patented Tricryption engine to create an abstraction layer, bridging applications requiring encryption with commonly used algorithms, libraries and toolkits on the market today. Expect other vendors to follow.

Such frameworks should reduce manpower that developers now devote to creating cryptography, or it may save the sanity of those unsure just how to customize, say, an RSA algorithm or OpenSSL. It also tackles a problem arising from transmissions using PKI or VPNs: what do to once encrypted data reaches its destination.

"Now, if an organization has multiple encryption projects going on, developers can go and build upon the same platform, so every data piece will be encrypted and still talk to each other," Erickson says.

The framework is especially appealing to security managers whose developers are racing against a legislative deadline.

"If you're building a simple Java app to run on your Web site and you get it wrong, there's not too much damage to be done," Erickson adds. "If you mess with your cryptography, very bad things can be done."

Dig Deeper on Disk and file encryption tools



Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.







  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...