SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Whitepaper Brief: Security Policy and Key Management from Vormetric
Security Policy and
Key Management
Centrally Manage Encryption Keys
Oracle TDE, SQL Server TDE and Vormetric
Download Whitepaper
Whitepaper Brief: Security Policy and Key Management from Vormetric
Click-to-Tweet
Download the Complete Whitepaper
The Importance of Encryption Key Management and Data Protection
Encryption key management can often prove to be challenging in environments that have ad hoc encryption solutions.
While ad hoc implementations often serve the objectives of the organization, they can make comprehensive key
management, and therefore effective data protection, more difficult. As the old adage goes, a chain is only as
strong as its weakest link. For encryption implementations, that link is more often than not, key management. Poor key
management can be deleterious in any number of ways. Not only is key management required to ensure the integrity
of the encryption system but various regulations and industry standards affect key management. These include: the
PCI DSS, GLBA, and HIPAA HITECH to name but a few. Addressing enterprise-level key management is a vital
component of a comprehensive data protection strategy.
Vormetric’s whitepaper: Simplifying IT Operations: Securing and Controlling Access to Data Across the Enterprise outlines
the challenges of enterprise key management and details ways to minimize the risk. Whether companies are using
integrated key management systems, third party systems, or a combination of both, IT personnel are challenged to
efficiently and securely manage the keys while still handling their day to day responsibilities. Adding to management’s
headaches are the results of a survey in which it was revealed that 40% of IT staff felt they could “hold their employer
hostage” by making it difficult or impossible to access vital data by withholding or hiding encryption keys. Without a
centralized system of encryption key management, security administrators are faced with costly, inefficient, and often
impossible task.
Encryption Key Management: Primary Criteria
According to the whitepaper, encryption key management should meet four primary criteria:
1.	 Security – In implementing a comprehensive data security strategy, organizations are well- advised to
consider the security of the encryption keys.
2.	 Availability – In addition to being secure, the keys must ensure that the data is available when it is
needed by the system or user.
3.	 Scalability and Flexibility – The key management solution should be able to address heterogeneous,
distributed environments so as not to hamper either growth or change.
4.	 Governance and Reporting – Reporting is essential to proper institutional governance. Often, third
party entities (be they customers or regulatory authorities) will request, and in some cases mandate,
proper governance and reporting of key management.
The Evolution of Key Management
The whitepaper strives to provide the reader with an understanding, not only of the importance of key management,
but of its evolution. Additionally, understanding that companies today require actionable information, the paper provides
the reader with a set of criteria for key management as well as an understanding of the challenges that may be faced.
Lastly, the paper describes Vormetric’s Key Management, a component of the Vormetric Data Security product family.
In an era of rampant litigation and regulation around the loss of personal data, and even the loss of corporate data
as that can impact shareholder value, proper implementation of security technologies and practices is of paramount
importance. As stated in the paper, “These attacks can have dire consequences for the enterprises under siege, resulting
in substantial loss of revenue, massive fines, and degraded customer trust.” As the threat landscape evolves into one
ripe with Advanced Persistent Threats and Hacktivists, companies must remain vigilant against both intentional and
accidental access and misuse of sensitive data. Encryption with strong key management remains the most effective way
to protect against the advancing threats.

Más contenido relacionado

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Destacado

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destacado (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Security Policy and Key Management: Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric

  • 1. Whitepaper Brief: Security Policy and Key Management from Vormetric Security Policy and Key Management Centrally Manage Encryption Keys Oracle TDE, SQL Server TDE and Vormetric Download Whitepaper
  • 2. Whitepaper Brief: Security Policy and Key Management from Vormetric Click-to-Tweet Download the Complete Whitepaper The Importance of Encryption Key Management and Data Protection Encryption key management can often prove to be challenging in environments that have ad hoc encryption solutions. While ad hoc implementations often serve the objectives of the organization, they can make comprehensive key management, and therefore effective data protection, more difficult. As the old adage goes, a chain is only as strong as its weakest link. For encryption implementations, that link is more often than not, key management. Poor key management can be deleterious in any number of ways. Not only is key management required to ensure the integrity of the encryption system but various regulations and industry standards affect key management. These include: the PCI DSS, GLBA, and HIPAA HITECH to name but a few. Addressing enterprise-level key management is a vital component of a comprehensive data protection strategy. Vormetric’s whitepaper: Simplifying IT Operations: Securing and Controlling Access to Data Across the Enterprise outlines the challenges of enterprise key management and details ways to minimize the risk. Whether companies are using integrated key management systems, third party systems, or a combination of both, IT personnel are challenged to efficiently and securely manage the keys while still handling their day to day responsibilities. Adding to management’s headaches are the results of a survey in which it was revealed that 40% of IT staff felt they could “hold their employer hostage” by making it difficult or impossible to access vital data by withholding or hiding encryption keys. Without a centralized system of encryption key management, security administrators are faced with costly, inefficient, and often impossible task. Encryption Key Management: Primary Criteria According to the whitepaper, encryption key management should meet four primary criteria: 1. Security – In implementing a comprehensive data security strategy, organizations are well- advised to consider the security of the encryption keys. 2. Availability – In addition to being secure, the keys must ensure that the data is available when it is needed by the system or user. 3. Scalability and Flexibility – The key management solution should be able to address heterogeneous, distributed environments so as not to hamper either growth or change. 4. Governance and Reporting – Reporting is essential to proper institutional governance. Often, third party entities (be they customers or regulatory authorities) will request, and in some cases mandate, proper governance and reporting of key management. The Evolution of Key Management The whitepaper strives to provide the reader with an understanding, not only of the importance of key management, but of its evolution. Additionally, understanding that companies today require actionable information, the paper provides the reader with a set of criteria for key management as well as an understanding of the challenges that may be faced. Lastly, the paper describes Vormetric’s Key Management, a component of the Vormetric Data Security product family. In an era of rampant litigation and regulation around the loss of personal data, and even the loss of corporate data as that can impact shareholder value, proper implementation of security technologies and practices is of paramount importance. As stated in the paper, “These attacks can have dire consequences for the enterprises under siege, resulting in substantial loss of revenue, massive fines, and degraded customer trust.” As the threat landscape evolves into one ripe with Advanced Persistent Threats and Hacktivists, companies must remain vigilant against both intentional and accidental access and misuse of sensitive data. Encryption with strong key management remains the most effective way to protect against the advancing threats.