Encryption: Debunking the Top 10 Myths About This Data Defense

By Chris Preimesberger  |  Posted 2012-12-13 Print this article Print
Myth #1: We'll See a Performance Hit

Myth #1: We'll See a Performance Hit

It's true that encryption has a cost, but there are many additional factors that affect total system performance. As long as encryption is implemented correctly, overhead can be minimal. Further, if you deploy virtualization on systems with commodity processors, the cost of extra CPU, especially in the cloud, is minor and certainly worth the investment to protect your data.


Encryption of business and personal data has long been irritating for those who have to administer it. However, new applications have come a long way in helping to modernize and simplify this important facet of data security. In reality, when deployed correctly, encryption does not need to be a headache and can instead be an enabler to achieve the flexible, compliant protection that is required in today's environments. For example, email encryption is an essential component of securing sensitive government information; a recent study found 47 percent of agencies say better email policies are necessary, but it also found that 45 percent report that employees do not follow existing policies. More troubling is the indication that agencies may be unable to enforce email policies unless their email gateways explicitly decrypt and scan desktop-encrypted email, despite meeting these policies. Enterprises are experiencing the same issues. To better understand the current state of security and what elements must be analyzed in selecting software, eWEEK and Steve Pate, CTO of HighCloud Security, present a listing of the 10 most common encryption myths. Pate is a 25-year veteran of enterprise security. HighCloud Security’s software addresses unique data privacy and encryption needs within private, hybrid and public clouds.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel