Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Encryption Blog
Showing posts tagged with key management
Showing posts in English
Brian Tokuyoshi | 15 Jun 2010 | 0 comments

Brian Tokuyoshi - Senior Product Marketing Manager

I recently attended the 2010 IEEE Key Management Summit, an event that brought together the leading industry pundits talking about the topic of key management. I had a number of interesting discussions with vendors, researchers and customers throughout the conference. In this blog, I’ll summarize some of the things that I saw and offer up a couple of opinions of my own.

The IEEE Key Management Summit was held the first week of May at North Shore Lake Tahoe, Nevada. This event attracts a technical audience, with heavy participation from the leadership of the standards group such as OASIS KMIP, IEEE 1619.3, and IETF KeyProv.

This is the second such conference, the first of which was held in back in 2008. That inaugural event had a number of healthy and loud discussions, where there were clearly differences in philosophies between the...

Brian Tokuyoshi | 27 May 2010 | 0 comments

PGP recently held a webcast on key management, where there were several questions that we didn’t have enough time to answer during the broadcast. In this blog entry, you’ll find the answers to those questions.

We didn’t have time to answer all the questions during the webcast, but I wanted to circle back and provide you with a detailed answer.

Q: Do you need both PGP Universal Server and PGP Key Management Server?  Or does PGP Key Management Server replace PGP Universal Server?

A: PGP Key Management Server is a new product based on some of the components of PGP Universal Server.  PGP Universal Server is for the management and administration of keys used with PGP applications. A company would use PGP Key Management...

Brendon Wilson | 18 May 2010 | 0 comments

Brendon J. Wilson – Director of Marketing, PGP TrustCenter Division

Last year, online shoppers spent over $150B in online transactions in the US alone – it wasn’t long ago that the lack of transaction security would have made these revenues inconceivable. Today, the security provided by the Secure Sockets Layer (SSL) protocol not only enables organizations to collect payments on the web, but also to securely communicate sensitive business information to partners, and to deliver internal network resources to remote workers.

As the global recession continues, SSL provides organizations a way to thrive despite the financial downturn by enabling businesses to expand market reach, to streamline costs, to tap far-flung resources, and to explore new revenue opportunities. Tapping these opportunities requires SSL certificates from...

Tim_Matthews | 22 Mar 2010 | 0 comments

Last week we shipped one of the most significant releases in PGP Corporation's short history - PGP 10/3.  The feature payload - which covers file protection, endpoint data protection, and email protection - was designed to help companies deal with the competing tensions of IT consumerization and increasing compliance.  There's a lot in the release, but if I had to net out four key features, here they are:

1) Support for Ubuntu and Red Hat Linux, giving increased coverage for laptops and netbooks

2) PGP Key Management Server 3.0, allowing key and policy management for 3rd party hardware and software...

Brian Tokuyoshi | 03 Mar 2009 | 0 comments

Brian Tokuyoshi - Product Marketing Manager

As the Academy Awards wrap up, I’m reminded of the film Amadeus, which won the Oscar for Best Picture in 1985. The eponymous film is a dramatization about the life of Wolfgang Amadeus Mozart. In a famous scene, Emperor Joseph II, offering his opinion on Mozart’s new symphony, comments that,  “There are simply too many notes”, without providing any deeper insight into which particular sequence trouble him.

Enterprises today are facing a related situation, except the issue should be called “too many encryption keys” as well as its closely related issue called “too many encryption products”. Let’s take a common example. Growing concerns about data breach notification laws lead ACME company to deploy a disk encryption product. Over time new requirements emerge, and ACME realizes that they need to...