Storage Networking Security Series – Key Management 101

Logo
Presented by

Judy Furlong, Dell Technologies; J Metz, Rockport Networks

About this talk

In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations are not compromised. This webinar will introduce the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented. After you watch the webcast, check-out the Q&A blog at: https://bit.ly/3dcnpId
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (112)
Subscribers (42439)
With virtualization and cloud computing revolutionizing the data center, it's time that the network has its own revolution. Join the Network Infrastructure channel on all the hottest topics for network and storage professionals such as software-defined networking, WAN optimization and more to maintain performance and service in your infrastructure