Data encryption: Lessons learned from implementation

Data encryption: Lessons learned from implementation

Date: Apr 20, 2009
Implemention encryption can be a tricky process, so these tips from chief security architect for Allstate Insurance Co., Eric Leighninger, can help make your implementation much smoother.

Check out the other videos in this series:

  • Part one: Pre-implementation best practices
  • Part two: Data encryption: Lessons learned from implementation
  • Part three: Q&A with Eric Leighninger

More on Data encryption techniques

  • canderson

    Data encryption: Pre-implementation best practices

    VIDEO - Encryption is one of the must-have technologies for financial institutions, but implementation can be a tricky process. In this video, Eric Leighninger of Allstate Insurance Co. offers best practices on laying the groundwork for full-disk encryption in your enterprise.
  • canderson

    Data encryption: Q&A with Eric Leighninger

    VIDEO - Eric Leighninger, the chief security architect for Allstate Insurance Co. answers audience members' questions on topics like data classification, Department of Defense standards and post-implementation patch updates, following his presentation on enterprise encryption.
  • Payment card fraud costs $8.6 billion per year, Aite Group says

    News - Research firm analyzes says end-to-end encryption is most practical means of thwarting card fraud

    ( Jan 14, 2010 )

  • Weighing the pros and cons of end-to-end encryption and tokenization

    Tip - With PCI DSS and other compliance requirements, organizations are looking for surefire solutions to protect payment card and other sensitive data. Tokenization and end-to-end encryption have emerged as promising technologies, but as Dave Shackleford explains, both have benefits and drawbacks that organizations must consider.
  • How to secure data backup

    Tip - Financial-services firms are among the many organizations that have reported losing backup tapes with sensitive customer data. In this tip, W. Curtis Preston explains how to secure data backup and the pros and cons associated with the three basic methods: source encryption, backup software encryption, and hardware encryption.
  • Too many encryption methods make secure communications difficult

    Tip - Financial-services firms looking to use encryption for secure communications with business partners can run into many complications because of all the encryption systems and standards. In this tip, Randall Gamby explains the various components that make up an encryption service and how interoperability is essential.
  • Massachusetts data protection law has mixed impact on financials

    News - Many financial institutions are already meeting new law's requirements for protecting state residents' personal information, but some have work to do.

    ( Aug 13, 2009 )

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: