As you can imagine, this situation has not gone un-noticed by manufacturers of security equipment and today we are starting to see the emergence of first generation automated key management systems. These are based on a secure platform with multiple levels of controls for allowing or denying access. In this way a policy can be set which, unless changed, will function error free even in the most testing of situations and which can be seamlessly ported to a remote site as part of a business continuity strategy.
So, having slain the dragon of encryption, it looks like the knights of the IT industry are turning their attention to security management, without which IT security will remain vulnerable to human frailty. Expect to see a lot more of this in the near future!
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.