Encryption without Enterprise Key Management—It’s Like Icing without Cake

  • Friday, March 4, 2016 | 11:20 AM – 12:10 PM | West | Room: 2005

View all Sessions

Deploying encryption systems without effective key management will not deliver on the promise of data security. Whilst the exciting part is the encryption technologies, loss of the keys will compromise any solution. In this session we’ll explore the value provided by the standardization of key management protocols as well as the critical part of a security solution it plays.


This document was retrieved from on Sun, 21 Jul 2019 05:31:41 -0400.