The need to protect data at rest is expanding the use of encryption for storage systems, and the movement of data to the cloud is pointing up the need for a standardized way to manage encryption keys across diverse infrastructures. The Key Management Interoperability Protocol is emerging as the standard for this job, with vendors beginning to incorporate KMIP in their products and customers making plans to use it. Cloud-based applications and storage are the primary drivers for its adoption.
The only get-out-of-jail card you have is if the data is encrypted.
— Richard Moulds, Thales eSecurity
Cryptography is becoming a commodity. But while encryption becomes easier, the essential job of managing the keys that encrypt and decrypt data across an enterprise remains a challenge.
Encryption 10 years ago was all about the Internet. Now it’s all about data at rest, because that’s where breaches are exposing personal and other extensive data in wholesale volumes. Government and industry regulations mandate encryption of this data, and most states require disclosure of breaches that expose personally identifiable information. “The only get-out-of-jail card you have is if the data is encrypted. So the encryption of data at rest has taken off. Read More
iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey. Contact Us