SMB encryption options and vendor vetting

Tags:
Encryption
Encryption keys
Midmarket security
From a reader: With the Nevada data protection regulation and upcoming Massachusetts data protection law, we're looking for a checklist of encryption issues we should raise as we begin to look at vendors. Also: What are some red flags to look for as we talk/negotiate with vendors? What are reasonable service/support demands that we can make? Any other help?

Answer Wiki

Thanks. We'll let you know when a new response is added.

Generally speaking you need to find out where your sensitive information is and then determine the best fit solution(s) for encrypting it when it’s at risk. Here are some thoughts I have on encryption and some questions to ask your security vendors. The important thing to keep in mind is that encryption does not automatically equal security…it’s also the people, the processes, and the other compensating controls you have around it. Compliance doesn’t equal security either. Here are some recent thoughts I had on why compliance as we know it and do it today is a joke.

I hope this helps!

Discuss This Question: 1  Reply

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • SearchMidmarketSecurityATE
    [...] Read the original post: SMB encryption options and vendor vetting [...]
    0 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following