Tip

Smart options for safeguarding stored data

W. Curtis Preston, Vice President of Data Protection, GlassHouse Technologies Inc., presented this session at Information

    Requires Free Membership to View

Security Decisions Fall 2005.


You can't pick up a newspaper these days without reading about another incident of backup tapes disappearing or storage networks getting hacked. Thanks to regulations like California's SB-1386, these previously private incidents are now front-page news. As a result, CEOs are mandating their staffs to encrypt anything that goes offsite or to encrypt everything including on-site data. The good news is that there are actually ways to meet both challenges with relative ease. And for those organizations without a pressing need to encrypt everything or a significant budget to do so, there are more cost-effective ways to encrypt backup tapes containing sensitive data. This presentation shows you how protect your data and keep your company from making the wrong kind of headlines.

W. Curtis Preston, the author of The Storage Security Handbook and Unix Backup & Recovery, begins with an overview of the security problems that companies are trying to address with encryption and authentication systems. He then explains the three basic ways to encrypt sensitive data: encryption at the source, encryption with a backup application and

MORE INFORMATION

Visit our resource center for more tips and advice on data encryption

View more presentations from some of the industry's foremost security practitioners

Learn more about Information Security Decisions

hardware encryption. Preston offers insight into the advantages and disadvantages of each option, paying special attention to the cost of implementation and management of such systems. Additionally he reveals how enhanced authentication systems make encryption useful, for without proper authentication, encryption is useless.

Download this presentation and gain an essential understanding of:

  • Whether encryption slows down backups and other storage processes
  • Secrets to key management
  • How to ensure keys don't get lost or given to the wrong person
  • How to enforce that only authorized people decrypt the data
  • The best, most cost-effective systems for companies with a small amount of data to encrypt
  • Options for companies with terabytes worth of data to encrypt every day
  • Other things businesses should be doing to enhance the security of their stored information

Download this presentation


This was first published in October 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.