
Critical Knowledge: Encryption in the Modern Enterprise
Description
Critical Knowledge: Encryption in the Modern Enterprise
This IDC Perspective identifies six principles that IT executives must understand about the use of encryption technology to protect sensitive information. Different encryption technologies exist to protect data that is stored at rest, in transit over a network, or in use on a computer system. These technologies are complex and require careful configuration and management to ensure that they function properly and are resilient against attack."Encryption is an intimidating technology for many IT leaders because it is highly technical and relies upon complex mathematical algorithms. While CIOs can and should leave the details of encryption to their cybersecurity teams, it is important that they have a working knowledge of the technology to provide responsible leadership and oversight," said Mike Chapple, adjunct research analyst, IDC.
Please Note: Extended description available upon request.
This IDC Perspective identifies six principles that IT executives must understand about the use of encryption technology to protect sensitive information. Different encryption technologies exist to protect data that is stored at rest, in transit over a network, or in use on a computer system. These technologies are complex and require careful configuration and management to ensure that they function properly and are resilient against attack."Encryption is an intimidating technology for many IT leaders because it is highly technical and relies upon complex mathematical algorithms. While CIOs can and should leave the details of encryption to their cybersecurity teams, it is important that they have a working knowledge of the technology to provide responsible leadership and oversight," said Mike Chapple, adjunct research analyst, IDC.
Please Note: Extended description available upon request.
Table of Contents
9 Pages
- Executive Snapshot
- Situation Overview
- Understanding Encryption
- Critical Knowledge for CIOs
- Encryption Is Just One Component of a Layered Defense
- Key Takeaways
- Encryption Algorithms Differ in Strength
- Key Takeaways
- Beware of "Security Through Obscurity"
- Key Takeaways
- Protecting Encryption Keys Is a Challenging, But Critical, Task
- Key Takeaways
- All Certificates Are Not Created Equal
- Key Takeaways
- Encryption Is Not Forever
- Key Takeaways
- A Final Word: The Basics of Understanding Encryption
- Types of Encryption Algorithms
- Key Distribution
- Transport Layer Security
- Advice for the Technology Buyer
- Learn More
- Related Research
- Synopsis
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.