Data Encryption refers to the translation or conversion of electronic data into an encrypted format that cannot be read without a key or password that allows you to decrypt or unencrypt it. The goal of data encryption is to ensure that only those who are authorized can access the data that is encrypted.
Not all data encryption techniques are the same. In a new world of advanced threats, and with data moving across systems far beyond the data store or database, new methods of protection are required for compliance and risk reduction.
Why Data Encryption?
Organizations across all industry and public sectors are increasingly challenged to protect their sensitive information (cardholder data, patient records, personal identifying information, and intellectual property) from threats like unauthorized insider access, accidental disclosure, and theft by a range of hostile outsiders.
Auditors, regulators, and industry compliance mandates often require encryption of sensitive data-at-rest as a minimum standard of care and security best practice. When sensitive data-at-rest is encrypted, the risks of audit failures, financial losses, and damage to an organization’s reputation are significantly reduced.
Data Encryption SolutionsHPE Security – Data Security drives leadership in data-centric encryption solutions with over 80 patents and 51 years of expertise protecting the world’s largest brands and neutralizing breach impact by securing sensitive data-at-rest, in-use and in-motion.
- Backup software – Automated, intelligent backup and recovery allows companies to protect, analyze, and optimize information.
- Application archiving –Structured data manager enables application archiving and retirement while retaining data access for compliance, eDiscovery and operations.
- Storage Optimization – Storage optimizer allows companies to intelligently manage unstructured data and distribute information across multiple storage repositories.
- Format-Preserving Encryption (FPE) – Preserving critical business functions by maintaining data format in structured data.
- Identity-Based Encryption – Information encryption for email, files, documents and databases utilizing Stateless key management.
- Page-Integrated Encryption (PIE) – Provide end-to-end encryption for web transactions.
Data Encryption Resources
- Data Security Trends: How Companies are Protecting Data
- Dark Reading Security Resources
- Cyber Risk Report
- HPE Silver Sponsors of “Let’s Encrpyt” intuitive, to enable secure communications on the web
- Fast, Secure NIST SP800-38G Format-Preserving Encryption – Clearing Misunderstandings and Myths
- FFX Modes of the AES Encryption Algorithm Specified in NIST’s SP 800-38G
- Rethinking email encryption: Eight best practices for success
- The Identity-Based Encryption Advantage – A Proven Standard for Protecting Information
- HPE ESKM – Key Protection Best Practices
- Local, Remote and centrally unified key management with HPE ESKM
- Security and Compliance Payment Trends