Critical Knowledge: Encryption in the Modern Enterprise

Critical Knowledge: Encryption in the Modern Enterprise

This IDC Perspective identifies six principles that IT executives must understand about the use of encryption technology to protect sensitive information. Different encryption technologies exist to protect data that is stored at rest, in transit over a network, or in use on a computer system. These technologies are complex and require careful configuration and management to ensure that they function properly and are resilient against attack."Encryption is an intimidating technology for many IT leaders because it is highly technical and relies upon complex mathematical algorithms. While CIOs can and should leave the details of encryption to their cybersecurity teams, it is important that they have a working knowledge of the technology to provide responsible leadership and oversight," said Mike Chapple, adjunct research analyst, IDC.

Please Note: Extended description available upon request.


Executive Snapshot
Situation Overview
Understanding Encryption
Critical Knowledge for CIOs
Encryption Is Just One Component of a Layered Defense
Key Takeaways
Encryption Algorithms Differ in Strength
Key Takeaways
Beware of "Security Through Obscurity"
Key Takeaways
Protecting Encryption Keys Is a Challenging, But Critical, Task
Key Takeaways
All Certificates Are Not Created Equal
Key Takeaways
Encryption Is Not Forever
Key Takeaways
A Final Word: The Basics of Understanding Encryption
Types of Encryption Algorithms
Key Distribution
Transport Layer Security
Advice for the Technology Buyer
Learn More
Related Research
Synopsis

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings