Storage Networking Security Series – Encryption 101

Logo
Presented by

Judy Furlong, Dell Technologies; Ed Pullin, Intel; Alex McDonald, NetApp

About this talk

Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper. Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots. But how does encryption actually work, what makes it tick, and how is it managed? How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?” It’s a big topic that we’re breaking down into three parts: Encryption 101, Key Management 101, and Applied Cryptography. Join us on May 20th for the first encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover: •A brief history of Encryption •Cryptography basics •Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc. •Introduction to Key Management After you watch the webcast, check out the Encryption 101 Q&A blog at https://bit.ly/2ZGMisl
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (120)
Subscribers (42432)
With virtualization and cloud computing revolutionizing the data center, it's time that the network has its own revolution. Join the Network Infrastructure channel on all the hottest topics for network and storage professionals such as software-defined networking, WAN optimization and more to maintain performance and service in your infrastructure