Storage Networking Security Series – Encryption 101

Logo
Presented by

Judy Furlong, Dell Technologies; Ed Pullin, Intel; Alex McDonald, NetApp

About this talk

Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper. Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots. But how does encryption actually work, what makes it tick, and how is it managed? How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?” It’s a big topic that we’re breaking down into three parts: Encryption 101, Key Management 101, and Applied Cryptography. Join us on May 20th for the first encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover: •A brief history of Encryption •Cryptography basics •Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc. •Introduction to Key Management After you watch the webcast, check out the Encryption 101 Q&A blog at https://bit.ly/2ZGMisl
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (401)
Subscribers (62663)
The Enterprise Architecture channel presents the next generation of Enterprise IT: recognizing the strategic importance of digital transformation and the data center to make companies more nimble and competitive. These presentations will help demanding IT and BizOps professionals achieve flexibility, scalability and performance with reduced risk and complexity.