How and Where to Secure Data 'At Rest'
sponsored by CREDANT Technologies
This Webcast will outline essential practices and technologies for securing data throughout its "at rest" lifecycle. The challenge of data security is complicated by IT complexity and the demands of granular user access control. The key to balancing data protection with data availability is to decide which controls to deploy at each layer in the data lifecycle -- application, database, file system, storage server, backup disks and tape.
Deciding if encryption should be used, where to encrypt data, which type of encryption to use and how to manage security "synergy" among the layers is critical to overall data security. Enterprise security decisions on these issues will impact the confidentiality and integrity of data at rest as well as access control and authentication management.
In addition to providing a general framework for data security, this webcast will also discuss various encryption options, including symmetric and asymmetric, source encryption, backup software encryption and in-line hardware. Within these product categories, it will also provide an overview on Windows Encrypting File System, televaulting, tape drive, tape library and virtual tape library encryption.
(THIS RESOURCE IS NO LONGER AVAILABLE.)