Key management solutions create, store, serve, and manage the life cycle of the secret keys needed for strong encryption.
Written by Patrick Townsend
Security auditors have begun placing new focus on encryption key management. Because the loss of encryption keys can compromise the security of all encrypted information, compliance auditors want enterprise customers to use best practices in the management and protection of encryption keys. This means integrating your encryption key management system into your high availability (HA) and disaster recovery (DR) plans.