Safeguarding Stored Data
sponsored by Storage Decisions Conference

W. Curtis Preston, the author of "The Storage Security Handbook" and "Unix Backup & Recovery," begins with an overview of the security problems that companies are trying to address with encryption and authentication systems. He then explains the three basic ways to encrypt sensitive data: encryption at the source, encryption with a backup application and hardware encryption. Preston offers insight into the advantages and disadvantages of each option, paying special attention to the cost of implementation and management of such systems. Additionally he reveals how enhanced authentication systems make encryption useful, for without proper authentication, encryption is useless.
(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement