A Strategic Approach to Enterprise Key Management

506 views

Published on

As enterprises continue to invest in data protection technologies and processes, it is evident that managing all of the keys and policies associated with sensitive information is becoming more onerous. Data encryption for the purpose of protecting information is being used in addition to traditional transport security technologies. Legislative and compliance requirements also continue to shape the way that customer and employee information is managed. FInd out the business drivers for enterprise encryption and key management, plus data protection best practices and approaches that can be employed.

Published in: Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
506
On SlideShare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
16
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

A Strategic Approach to Enterprise Key Management

  1. 1. A Strategic Approach to Enterprise Key Management D kT Derek Tumulak lk VP Product Management, EDP SafeNet
  2. 2. Overview • What is Key Management? • Data Breaches and the Regulatory Landscape g y p • Key Management Standards • The Need for Key Management • Key Management Alternatives • Components of Enterprise Key Management • Enterprise Key Management Architecture Et iKM t A hit t • Conclusion

×