Layering Crypto Technologies for Enterprise Data Protection
Implementing enterprise encryption can be a daunting and complex process. Organizations often struggle with questions such as: What data should be encrypted? Where should encryption occur? In a recent SHARE event presentation, IBM Cryptographic Software Developer Eysha Shirrine Powers discussed various encryption techniques available and the pros and cons of each. She also described how to layer multiple crypto technologies, protecting sensitive data against threats, which she described as a pyramid shape. In this pyramid model, the bottom represents the widest coverage and the top level offers complexity in the form of granular control over applications.
Read more for an overview of these various layers, including the advantages and costs involved in each, and watch the full video of Eysha Shirrine Powers’ “The Encryption Pyramid: Choosing the Level That Works for You” presentation.