In this webinar, Securosis and Thales review encryption and key management basics, outline the four primary key management strategies, show how they map to typical enterprise use cases, and review how to choose a strategy that best fits your organization today while preparing you for tomorrow’s needs.
Rich Mogull, Securosis and Richard Moulds, Thales eSecurity
Over the years, key management has developed a dubious reputation – in a large part due to numerous crypto-enabled products failing to meet enterprise requirements for full lifecycle key management and few being genuinely easy to use. Fortunately, new techniques and tools remove much of the historical pain of key management, setting the stage for better experiences with mature technologies like encryption and PKI as well as a host of new and innovative applications.