Evolving Encryption Key Management Best Practices for the Data Center

Encryption is one of the security linchpins that spans our IT deployments, and is central to keeping us compliant, maintaining proper separation of duties, enforcing security, and providing the artifacts to keep auditors happy. Centralizing key management isn't the only option, but it is increasingly the right one. This Securosis research highlights emerging best practices for managing encryption keys for protecting data-at-rest, and presents use cases and architectures for the areas where we get the most implementation questions.

Sponsor: Hewlett Packard Enterprise