Key management solutions create, store, serve, and manage the life cycle of the secret keys needed for strong encryption.
Written by Patrick Townsend
Security auditors have begun placing new focus on encryption key management. Because the loss of encryption keys can compromise the security of all encrypted information, compliance auditors want enterprise customers to use best practices in the management and protection of encryption keys. This means integrating your encryption key management system into your high availability (HA) and disaster recovery (DR) plans.
A well-designed, well-implemented set of HA and DR technologies will protect an organization against equipment failures, utility interruptions, and natural disasters.
Written by Chris Thomas
Editor's Note: This article is based on "Next-Generation Disaster Recovery and Availability Technologies for IBM Power Systems," a free white paper downloadable from the MC Press White Paper Center.
The High Availability/Disaster Recovery solution spectrum requires that you consider a technology's ability to protect data and keep operations online or bring them back online quickly. Each class of HA/DR technology exhibits different operating characteristics, providing a distinct range of data protection and downtime avoidance.
What happens elsewhere is eventually going to affect you!
By Carol Woodbury
Good question. Why should you care what happens in Massachusetts unless you live there? The answer is because what happens in states such as California and now Massachusetts tends to spread to other states. The breach notification law started in California has spread to almost all of the states, and similar ones are being debated across Europe and Asia. If the Massachusetts privacy laws spread like the California law, you'll want to be prepared. Let's take a closer look.