Research and Whitepapers

image description

Decision Criteria and Analysis for Hardware-Based Encryption

Organizations trying to balance the risk of data breaches against the cost of pervasive encryption often balk at the tradeoff. The use of hardware security modules (HSMs) in conjunction with applications that perform encryption improves the protection afforded to encryption keys and the encryption processes themselves, but cost considerations typically limit the scope of their deployment. This paper defines criteria to help organizations decide which applications or data would benefit most from hardware-based encryption and key protection. The criteria are designed to make those decisions repeatable, consistent, and specific for any application, based on the organization’s sensitivity to cost, risk tolerance, and performance requirements.