Charting Your Path to Enterprise Key Management


Click here to download now

Source: SafeNet
Date: August 2010
Type: White Paper
Rating: (0)

Overview: Steps to Take Today for a More Efficient, Secure Key Infrastructure

The increasingly prevalent use of data protection mechanisms in today’s enterprises has posed significant implications. Enterprises today need to balance several equally critical business mandates:

Strengthen security. Businesses need to enhance data security to minimize the risk of loss or breach of sensitive, personally identifiable information of patients, customers, or employees. Companies must also protect intellectual property, such as legal records, files and correspondence associated with mergers and acquisitions, trademarked digital media, and much more.

Ensure regulatory compliance. It is incumbent upon organizations to comply with all relevant regulations, whether that means organizations following regional privacy and breach notification rules, including U.S. state laws and the E.U. data protection directive; retailers adhering to the Payment Card Industry Data Security Standard (PCIDSS); financial organizations complying with Sarbanes- Oxley; or healthcare organizations meeting standards set forth in the Health Insurance Portability and Accountability Act (HIPAA).

Manage costs and leverage investments. In an uncertain, tough economic climate, costs need to be managed closely, and businesses need to wring maximum value out of their investments. Protecting, managing, and leveraging a heterogeneous environment requires a combination of integration flexibility and interoperability through open standards.

This paper looks at the past, present, and future of key management, revealing how emerging trends and approaches will ultimately enable enterprises to optimize both efficiency and security in the management of key materials.

Not what you're looking for? Search again
Go Advanced »
More From the Application Security Section

View All Categories

Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management

Development : Architecture & Design, C/C++, Database, Development Tools, Embedded Systems, High Performance Computing, Java, Mobility, Security, Web Development, Windows/.NET, Open Source

Government : Cloud/SaaS, Enterprise Applications, Enterprise Architecture, Federal, Information Management, Leadership, Mobile & Wireless, Policy & Regulation, Security, State & Local

Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers

Healthcare : Policy & Regulation, Leadership, Security & Privacy, Mobile & Wireless, Electronic medical records, Clinical information systems, Administration systems, Interoperability, The Patient

Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services

Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business

Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends

Mobility : 3G Wireless/Broadband, 802.11x, Fixed Mobile Convergence, Mobile Business, Mobile Messaging, Muni Wireless, RFID, Smartphones, Wi-Fi VOIP, Wi-Fi/WiMax, Wireless Security, WLAN

Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds

Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats

Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services

Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services

Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization

Telecom : VOIP, Unified Communications, Voice services, PBXs, Call Centers, Presence, Collaboration Systems, Business, Regulation, Internet policy

Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Office Suite, Open Source, Operating system, Security