As part of the paper's storage encryption to-do list, Oltsik details three realistic steps to provide the necessary protection for stored data based on risk.
The white paper covers:
- What are the real threats to data today
- Where do you really need to encrypt data first
- How does key management fit into your encryption plans
- What shifts in the industry and vendor developments will mean to your storage environment and strategy
This is must read advice for storage and security professionals.