Download now Free registration required
This paper discusses an example where uncontrolled encryption can be harmful to an organization. Contingency keys provide a mechanism by which an organization can keep control of the data within the enterprise. It looks at some common use cases for encryption and how contingency keys can be incorporated into those scenarios with little or no impact to the operation. Contingency keys in operation have no platform boundaries or restrictions. It is possible for an enterprise to achieve contingency access to data even when the end-user is employing password-based encryption, because the contingency key is still included in the encryption operation.
- Format: PDF
- Size: 818.5 KB