Andrew Buss, IDC | This IDC Technology Spotlight discusses how an approach to encrypting data and requiring authorization access allows organizations to regain control of their critical digital assets. Take control of your distributed data.
Welcome to the New Era of Encryption
John Kindervag, Forrester
Talking about encryption is all the rage these days — from revelations about the National Security Agency’s (NSA’s) surveillance program to a new wave of movies and TV shows featuring hackers and cybercriminals. All of this attention means that it’s time to distinguish mythology from truth and value from risks in this critical discussion. In this report, we provide security and risk (S&R) pros with a discussion of the benefits, pros, and cons of encryption, the future direction of encryption technologies, and useful recommendations for firms embarking on more ubiquitous encryption.