Understanding And Selecting A Key Management Solution (Webcast) - Webinar

This webinar, the second in a two-part series from Securosis and Thales eSecurity focused on key management, explains deployment options, describes important technology and management features, and includes a practical checklist to use when selecting a key management solution to best fit the needs of specific projects and environments.

Organizations that are expanding their use of encryption technology for data protection are increasingly turning their attention to developing an overarching enterprise key management strategy. However, the complexities of meeting current needs while trying to account for future requirements and evolving virtualization and cloud computing initiatives can easily cause confusion and frustration.