1) The document discusses various methods for implementing encryption to secure network storage, including at the application level, file system level, device driver/network interface level, and centralized network level.
2) Centralized network encryption provides benefits like centralized key management across heterogeneous storage, while encryption in the storage device itself secures data with no performance impact and simplifies key management.
3) The best encryption method depends on factors like whether all sensitive data is in one place, performance impacts, ability to selectively encrypt, scalability needs, and compatibility across environments.