Podcast: Don’t Forget FIPS 140-2 and Other Fundamental Key Management Features
Over the last several years, encryption key management has attained “essential infrastructure” status. When done properly, key management can protect encrypted data - and in the event of a data breach, can even provide a company with an exemption for a breach notification.
Webinar: vSphere Encryption Key Management
VMware includes encryption in vSphere 6.5, making it easy to encrypt private data, but leaves final and most important component, key management, to the customer. Join Patrick Townsend as he discusses vSphere’s encryption capabilities and how you can configure it using Townsend Security’s key management server (KMS).
Podcast: Protecting Data with vSphere & vSAN Encryption
Learn about vSphere and vSAN encryption, deploying multiple, redundant key servers as a part of the KMS Cluster configuration for maximum resilience and high availability, as well as meeting compliance regulations and security best practices for your organization.
White Paper: Encryption Key Management System vs Service - KMS Differences Explained
In IT technology and security, the language and three-letter acronyms we use can sometimes make things more confusing than they need to be. That’s true with encryption key management systems and services that are available today. So let’s sort out the language, TLAs, and try to reduce some of the confusion in this area.