Understanding and Selecting a Key Management Solution

Organizations that are expanding their use of encryption technology for data protection are increasingly turning their attention to developing an overarching enterprise key management strategy. However, the complexities of meeting current needs while trying to account for future requirements and evolving virtualization and cloud computing initiatives can easily cause confusion and frustration. This webinar, the second in a two-part series from Securosis and Thales e-Security focused on key management, explains deployment options, describes important technology and management features, and includes a practical checklist to use when selecting a key management solution to best fit the needs of specific projects and environments.

Watch On Demand