Complete the form to download

*All fields required.

  •  

Data Security Policy and
Encryption Key Management

Whether companies are using integrated key management systems, third party systems such as Oracle TDE or SQL Server TDE, or a combination of all systems as part of their data security policy, IT personnel are challenged to efficiently and securely manage the keys while still handling their day to day responsibilities. Without a centralized system of encryption key management, security administrators are faced with costly, inefficient, and often impossible task.

The Vormetric Key Management white paper provides the reader with an understanding of, not only of enterprise key management evolution, but of the importance of its selection criteria including:

Data Security

Where are they stored and how are they protected? Improper key management means weak encryption, and that can translate into vulnerable data.

Availability

In addition to being secure, the key management system must ensure that the data is available when it is needed by the system or user.

Scalability & Flexibility

Growth and change are inevitable in an organization. The key management solution should be able to address heterogeneous, distributed environments so as not to hamper either growth or change.

Governance and Reporting

Often, third party entities (be they customers or regulatory authorities) will request, and in some cases mandate, proper governance and reporting of key management. That means implementing and enforcing things like separation of duties, authorization process and key lifecycle management.


 


If you have immediate questions, please give us a call at (888) 267-3732. Thank you!