Abstract
We hear every month of another cyber attack, hacking event or just plain data theft where thousands to millions of data records are exposed. A number of techniques are available that can minimize the data exposure risk in these cases but they all involve some form of data-at-rest-security. We discuss the many different approaches to secure data-at-rest in your IT shop.
Learning Objectives
Understand the many ways to provide data-at-rest security for block and file data.
Understand the implications of various approaches to data-at-rest security with respect to key management, storage performance, and cost