Skip Navigation

CTO Sessions: Pros and Cons of Native vs. External Key Management

Event Details

May 19, 2022

2:00 PM ET; 11:00AM PT

Live Webinar

Key management is a no-brainer - the encryption keys used to encrypt/decrypt data must be protected to prevent unauthorized access to the encrypted data. Many data-at-rest encryption providers offer low-cost, native key management tools that afford some level of protection for encryption keys.

However, data-at-rest encryption best practices necessitate the use of an external key manager for maximum security that separates encryption keys from encrypted data. External key managers provide centralized key management for multiple on-premises data stores and cloud infrastructures and can utilize a FIPS-compliant HSM as a hardware root-of-trust.

Ultimately, users must weigh the pros and cons of native vs. external key management - both having their advantages and disadvantages.

Attend this webinar to learn about best practices for key management and how to determine which form of key management is the best fit for your on-premises, virtual, or cloud storage environments. Thales TCT's Deputy CTO will:

  • Outline the basics of native and external key management
  • Weigh the pros and cons of both solutions
  • Discuss how to determine which solution is the best fit for your environment

Register Now

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept