*All fields required.
CISOs and their peers realize that ad hoc encryption is no longer adequate: It leads to higher costs and increased risk. So, what's needed? An enterprise encryption and key management strategy that can extend across all sensitive data, in all formats, across the entire organization. From an organizational perspective, this newly published ESG White Paper, commissioned by Vormetric, explains that enterprise encryption strategy will only work if it has:
This includes several management disciplines including policy management, configuration management, and reporting/auditing.
Central encryption and key management policies must be enforced on heterogeneous systems distributed throughout the enterprise
This "gotta have" functionality enables enterprises to set and enforce both enterprise and departmental policies and allows separation of duties where security administrators, not functional IT staff, control their own encryption management domains.
As part of an enterprise encryption architecture, key management becomes a central service for all activities, including key creation, storage, rotation, and revocation