Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Encryption strategy guide from Thales

Thales : 30 April, 2009  (Technical Article)
Thales has introduced a guide to assist in the selection of a successful database encryption strategy for the protection of critical information resources
As corporate networks become increasingly open to the outside to accommodate suppliers, customers and partners, network perimeter security is no longer sufficient to protect data. Industry experts have long recommended a "defence in depth" approach by adding layers of security around data. With the network regarded as inherently insecure, encrypting the data itself is the best option, often cited as the "last line of defence".

Yet many companies continue to shy away from database encryption due to the perceived challenges associated with such a project. In particular, organisations worry about key management in terms of losing or compromising encryption keys. Against this backdrop, Thales is launching its Guide to database security which provides advice on best practice database encryption and explains how to implement a successful key management strategy.

According to Christian Kirsch, Product Marketing Manager at Thales, "For many organisations, databases are a treasure trove of sensitive information containing data ranging from customers' personal details and confidential competitive information to intellectual property. Lost or stolen data, especially customer data, can result in brand damage, competitive disadvantage and serious fines. In high-profile cases, compromised data can present organisations with long-term customer acquisition and retention difficulties.

"Modern approaches to database encryption, such as the Transparent Data Encryption (TDE) architecture introduced by Oracle and Microsoft, are making it easier for organisations to deploy database encryption because TDE does not require any changes to database applications. As data breaches become more commonplace, organisations must increasingly go beyond what's required of them by industry regulation and implement comprehensive database security strategies based on end-to-end encryption in order to effectively protect sensitive data and avoid the consequences of serious data losses."

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo