eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.
1Debunking the Top 10 Myths About Encryption
2Myth: Encryption Will Degrade My System’s Performance
3Myth: Encryption Terminology Is Too Hard to Understand
4Myth: Managing All Those Encryption Keys Is a Nightmare
5Myth: It’s Easy to Lose My Encryption Keys
6Myth: Encryption Is Hard to Deploy
7Myth: Encryption Only Secures the Application
8Myth: Rotating Encryption Keys Means Application Downtime
It’s a best practice and required for many regulations, but it doesn’t mean downtime for all platforms. Rotating an encryption key requires decrypting and then encrypting with the new key, usually requiring downtime. Many solutions can do the rekeying operation in the background, which requires no downtime to perform a rekey or rotate the encryption keys.
9Myth: Enterprise-Grade Encryption Is Expensive
The cost of entry for encryption is zero for many platforms and inexpensive for the protection received. Some cloud providers and host platforms already provide encryption as part of the platform (such as Bitlocker or AWS encryption). The return on investment for encryption is significant if you consider that you can alleviate the need to do breach notification if the breached data was encrypted, or that cyber-risk insurance premiums may be lower if your data is encrypted.
10Myth: Encryption in the Cloud Isn’t Secure
11Myth: Encryption Solutions Don’t Work Across All Platforms
New-gen encryption solutions are not only available for any mobile device (Apple/Samsung), server (Bitlocker/Linux) or cloud service (Azure, AWS, vCloud Air), but can work across different platforms. This is because the solution is built with cross-platform key management and encryption in mind.