10-16-13 | Blog Post
Online Tech’s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by walking through the steps that will make implementing data encryption for your business easier and more cost-effective.
How can you make encryption easier to implement?
One example is Online Tech’s encrypted cloud solution that uses EMC VMAX storage (SAN).
If you have a virtual private server, when your data hits our storage array, it is written to hard drive and is encrypted. Using AES 256-bit, your data can meet compliance requirements for encryption.
Another service we provide is SSL certificates, two-factor authentication and VPN. These layers of security provide encrypted data at rest and encrypted mobile VPN. An additional step is to select a vendor for their software that builds encryption into their software application.
Watch the full video on our site.
View other videos in the data encryption series here, and check back as we continue to update! Aiello will also be speaking on a panel discussion at the Detroit SecureWorld Expo (today!):
Industry Expert Panel: Network Security
Room: Suite 3
Time: 1:15pm – 2:15pm
Description: Network Security is defined as, “the protection of a computer network and its services from unauthorized modification, destruction or disclosure.” Cyber security professionals are tasked with keeping up with new threats to the network while maintaining efficient workflow and access to information. This panel discussion aims to explore current issues being raised in the area of Network Security and solutions available to make the network more secure.
Learn more about encryption of data at rest and in transit on our Defense in Depth page.
The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using encryption in the cloud.
Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a full arsenal of security services for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.
Download our latest white paper, Encryption of Cloud Data.