Fact or fiction: Pros and cons of database encryption
According to our latest survey of more than 608 enterprise security pros, 80% of enterprises say protecting data is more important in 2007 than last year, and 72% admit they need a better strategy. SearchSecurity.com is responding to this growing need with a multi-lesson Data Protection Security School to help you formulate a comprehensive strategy to secure sensitive info throughout your network. When you are encrypting data within a database you have two basic choices: encrypting the entire database or encrypting specific fields at the data level. This podcast explains the pros and cons of each approach.
![]() |
|
![]() |
![]() |
![]() |
This podcast is a portion of SearchSecurity.com's Data Protection Security School lesson, Data encryption demystified. Visit the lesson and school pages for additional learning resources, or visit our Security School Course Catalog to begin other lessons.
According to our latest survey of more than 608 enterprise security pros, 80% of enterprises say protecting data is more important in 2007 than last year, and 72% admit they need a better strategy. SearchSecurity.com is responding to this growing need with a multi-lesson Data Protection Security School to help you formulate a comprehensive strategy to secure sensitive info throughout your network.
When you are encrypting data within a database you have two basic choices: encrypting the entire database or encrypting specific fields at the data level. This podcast explains the pros and cons of each approach.
Play now:
You must have Adobe Flash Player 7 or above to view this content.See
https://www.adobe.com/products/flashplayer to download now.
|
Download for later:
Fact or fiction: Pros and cons of database encryption
• Internet Explorer: Right Click > Save Target As • Firefox: Right Click > Save Link As |
About the speaker:
Tom Bowers is managing director of consulting firm Security Constructs.