Download Now Free registration required
As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective and secure key management policies. Without the proper key generation, distribution, storage, and recovery, valuable data will be eventually compromised. How to manage keys becomes a challenging task. Adequate understanding of these new challenges is essential to effectively devise new key management policies and mechanisms to guard against them. This paper studies key management systems and perform some scenarios used for deploying data-at-rest encryption solutions in Storage Area Network (SAN) environment.
- Format: PDF
- Size: 236.9 KB