Information Security Research Library

Powered by


This Webcast will outline essential practices and technologies for securing data throughout its "at rest" lifecycle. The challenge of data security is complicated by IT complexity and the demands of granular user access control. The key to balancing data protection with data availability is to decide which controls to deploy at each layer in the data lifecycle -- application, database, file system, storage server, backup disks and tape.

Deciding if encryption should be used, where to encrypt data, which type of encryption to use and how to manage security "synergy" among the layers is critical to overall data security. Enterprise security decisions on these issues will impact the confidentiality and integrity of data at rest as well as access control and authentication management.

In addition to providing a general framework for data security, this webcast will also discuss various encryption options, including symmetric and asymmetric, source encryption, backup software encryption and in-line hardware. Within these product categories, it will also provide an overview on Windows Encrypting File System, televaulting, tape drive, tape library and virtual tape library encryption.


Browse Related: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.