Challenges of Key Management
This section will review several challenges IT organizations face when trying to control and manage their encryption keys are:
- Complex Management: Managing a plethora of encryption keys in million.
- Security Issues: Vulnerability of keys from outside hackers/malicious insiders.
- Data Availability: Ensuring data accessibility for authorized users.
- Scalability: Supporting multiple databases, applications and standards.
- Governance: Defining policy driven, access, control and protection for data.
Read more about this topic: Key Management
Famous quotes containing the words challenges, key and/or management:
“The approval of the public is to be avoided like the plague. It is absolutely essential to keep the public from entering if one wishes to avoid confusion. I must add that the public must be kept panting in expectation at the gate by a system of challenges and provocations.”
—André Breton (18961966)
“Power, in Cases world, meant corporate power. The zaibatsus, the multinationals ..., had ... attained a kind of immortality. You couldnt kill a zaibatsu by assassinating a dozen key executives; there were others waiting to step up the ladder; assume the vacated position, access the vast banks of corporate memory.”
—William Gibson (b. 1948)
“People have described me as a management bishop but I say to my critics, Jesus was a management expert too.”
—George Carey (b. 1935)