Gartner Report: Develop an enterprisewide Encryption Key Management Strategy or Lose the Data
In this Report you will learn about:
Data Security Governance: Employ data security governance principles by focusing on sensitive data protection and privacy , conducting , deleting unnecessary data, and consolidating data silos, whether they are on-premises or in the cloud, to ensure project alignment with business objectives.
Minimize Data Security Vendors: Minimize the number of encryption vendors, where possible, to simplify key management operations by leveraging multiple products from a single vendor that can be applied to multiple data protection use cases business objectives.
Crypto Operations: Focus on establishing the operational configurationof an EKM deployment that address access, backup, long-term storage and crypto-agilibilty, and start with default vendor settings rather than initially focusing on the "bits and bytes" settings business objectives.
Apply Crypto to All Data Protection: Develop a formalized EKM process that is applicable to all data protection use cases to simplify operations, minimize cost of ownership and reduce the overall risks to data security and privacy.