W. Curtis Preston, Vice President of Data Protection, GlassHouse Technologies Inc., presented this session at Information
Security Decisions Fall 2005.
You can't pick up a newspaper these days without reading about another incident of backup tapes disappearing or storage networks getting hacked. Thanks to regulations like California's SB-1386, these previously private incidents are now front-page news. As a result, CEOs are mandating their staffs to encrypt anything that goes offsite or to encrypt everything including on-site data. The good news is that there are actually ways to meet both challenges with relative ease. And for those organizations without a pressing need to encrypt everything or a significant budget to do so, there are more cost-effective ways to encrypt backup tapes containing sensitive data. This presentation shows you how protect your data and keep your company from making the wrong kind of headlines.
W. Curtis Preston, the author of The Storage Security Handbook and Unix Backup & Recovery, begins with an overview of the security problems that companies are trying to address with encryption and authentication systems. He then explains the three basic ways to encrypt sensitive data: encryption at the source, encryption with a backup application and
Download this presentation and gain an essential understanding of:
- Whether encryption slows down backups and other storage processes
- Secrets to key management
- How to ensure keys don't get lost or given to the wrong person
- How to enforce that only authorized people decrypt the data
- The best, most cost-effective systems for companies with a small amount of data to encrypt
- Options for companies with terabytes worth of data to encrypt every day
- Other things businesses should be doing to enhance the security of their stored information