Smart options for safeguarding stored data

Learn the three basic ways to encrypt sensitive data: encryption at the source, encryption with a backup application and hardware encryption, as well as the advantages and disadvantages of each option.

W. Curtis Preston, Vice President of Data Protection, GlassHouse Technologies Inc., presented this session at Information

Security Decisions Fall 2005.


You can't pick up a newspaper these days without reading about another incident of backup tapes disappearing or storage networks getting hacked. Thanks to regulations like California's SB-1386, these previously private incidents are now front-page news. As a result, CEOs are mandating their staffs to encrypt anything that goes offsite or to encrypt everything including on-site data. The good news is that there are actually ways to meet both challenges with relative ease. And for those organizations without a pressing need to encrypt everything or a significant budget to do so, there are more cost-effective ways to encrypt backup tapes containing sensitive data. This presentation shows you how protect your data and keep your company from making the wrong kind of headlines.

W. Curtis Preston, the author of The Storage Security Handbook and Unix Backup & Recovery, begins with an overview of the security problems that companies are trying to address with encryption and authentication systems. He then explains the three basic ways to encrypt sensitive data: encryption at the source, encryption with a backup application and

MORE INFORMATION

Visit our resource center for more tips and advice on data encryption

View more presentations from some of the industry's foremost security practitioners

Learn more about Information Security Decisions

hardware encryption. Preston offers insight into the advantages and disadvantages of each option, paying special attention to the cost of implementation and management of such systems. Additionally he reveals how enhanced authentication systems make encryption useful, for without proper authentication, encryption is useless.

Download this presentation and gain an essential understanding of:

  • Whether encryption slows down backups and other storage processes
  • Secrets to key management
  • How to ensure keys don't get lost or given to the wrong person
  • How to enforce that only authorized people decrypt the data
  • The best, most cost-effective systems for companies with a small amount of data to encrypt
  • Options for companies with terabytes worth of data to encrypt every day
  • Other things businesses should be doing to enhance the security of their stored information

Download this presentation


This was first published in October 2005

Dig deeper on Disk Encryption and File Encryption

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close