Storage Networking Security Series: Essential Guide to Key Management π
Learn the fundamentals of key management in storage networking security to safeguard your cryptographic keys and enhance data protection. Discover best practices and strategies to keep your information secure.

SNIAVideo
932 views β’ Jun 15, 2020

About this video
In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations are not compromised.
This webinar introduces the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented. After you watch the video, check out the Q&A blog: https://bit.ly/3dcnpId
Presented by Judy Furlong, Dell Technologies; J Metz, Rockport Networks
This webinar introduces the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented. After you watch the video, check out the Q&A blog: https://bit.ly/3dcnpId
Presented by Judy Furlong, Dell Technologies; J Metz, Rockport Networks
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
932
Likes
17
Duration
01:01:00
Published
Jun 15, 2020