Research and Whitepapers

image description

Understanding and Selecting a Key Management Solution

Organizations that are expanding their use of encryption technology for data protection are increasingly turning their attention to developing an overarching enterprise key management strategy. However, the complexities of meeting current needs while trying to account for future requirements and evolving virtualization and cloud computing initiatives can easily cause confusion and frustration.

In this white paper, the second in a two-part series, industry analyst Rich Mogull from Securosis explains deployment options, describes important technology and management features, and presents a practical checklist to use when selecting a key management solution to best fit the needs of specific projects and environments. To access the first paper in the series, which focuses on how to choose an overall key management strategy, please click here.