Given the continuous news of lost backup tapes and unauthorized access to corporate databases, more attention needs to be given to the effective encryption of “data-at-rest”. Encrypting stored data can be one of the most critical facets of an organization’s defense-in-depth strategy.
Securing data while it travels between applications, business partners, suppliers, customers, and other members of an extended enterprise is crucial. As enterprise networks continue to become increasingly accessible, with more and more organizations adopting an “Internet Centric” model, so do the risks that information will be intercepted or altered in transmission difficult to manage.
This is the very essence of the Vaulting Technology. Vaulting Technology makes certain that an inevitable slip in an organizations security posture won’t result in stolen intellectual property, or having to inform customers that they’re at risk of identity theft because their personally. Today many companies are still exchanging highly sensitive data by couriers because the infrastructures they have in place have not addressed the protection of highly sensitive data. It’s a bit like having email but still relying on the Pony Express for the really critical stuff! Certain traditions are not worth keeping!
There was a day when everything was committed to paper and locked in a secure vault or safe in the office. Nowadays everything is digital but it still needs to be locked away in a digital vault. After all somebody is bound to forget to lock the door sooner or later.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.