Encryption: Debunking the Top 10 Myths About This Data Defense
Myth #1: We'll See a Performance Hit
It's true that encryption has a cost, but there are many additional factors that affect total system performance. As long as encryption is implemented correctly, overhead can be minimal. Further, if you deploy virtualization on systems with commodity processors, the cost of extra CPU, especially in the cloud, is minor and certainly worth the investment to protect your data.
Encryption of business and personal data has long been irritating for those who have to administer it. However, new applications have come a long way in helping to modernize and simplify this important facet of data security. In reality, when deployed correctly, encryption does not need to be a headache and can instead be an enabler to achieve the flexible, compliant protection that is required in today's environments. For example, email encryption is an essential component of securing sensitive government information; a recent study found 47 percent of agencies say better email policies are necessary, but it also found that 45 percent report that employees do not follow existing policies. More troubling is the indication that agencies may be unable to enforce email policies unless their email gateways explicitly decrypt and scan desktop-encrypted email, despite meeting these policies. Enterprises are experiencing the same issues. To better understand the current state of security and what elements must be analyzed in selecting software, eWEEK and Steve Pate, CTO of HighCloud Security, present a listing of the 10 most common encryption myths. Pate is a 25-year veteran of enterprise security. HighCloud Security’s software addresses unique data privacy and encryption needs within private, hybrid and public clouds.