Paradigm for Keys & Secrets Mgmt: Enterprise Visibility, Monitoring & Compliance

Logo
Presented by

Michael McCormick, Global Director - Multi-Cloud Security, Entrust & Chris Ghantous, Technical Solutions Director, Entrust

About this talk

As enterprises use cryptography at scale to protect applications, workloads, and data, traditional key and secrets management solutions often struggle with tracking and controlling the use of keys and secrets throughout their lifecycle. It’s a lot to consider for any organization especially when keys are distributed across different applications, business units, deployment locations, and geographical regions and becomes painfully apparent as enterprises attempt to meet their compliance mandates and data sovereignty requirements. In this webinar, we’ll cover the issues with managing keys and secrets at scale by combining traditional key and secrets lifecycle management and a decentralized vault-based architecture to enable organizations to tightly manage, monitor, and control keys and secrets to comply with industry, national and international standards, and regulations no matter where the keys and secrets reside. Join the webinar and learn how to: • Put measures in place for compliance with corporate security and data protection policies • Address data sovereignty mandates by restricting the location of data and encryption keys • Establish a decentralized key management architecture in preference to a monolithic key management system
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (406)
Subscribers (36153)
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.