Video: Data Encryption in Transit vs. at Rest

Posted 10.15.13 by

Online Tech’s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by explaining difference between data encryption in transit vs. at rest and how symmetric and asymmetric encryption are used.

One encryption algorithm that is popular is AES – Advanced Encryption Standard. Using symmetric and asymmetric in encryption is important to understand.

With symmetric encryption, your decryption key is the same on both sides. Symmetric key cryptography is when the sender and receiver of a message shares a single key (the same one) to both encrypt and decrypt the message.

(For more Encryption Glossary Terms, download our Encryption of Cloud Data white paper today). This type of encryption is used to protect the bulk of our information on the Internet.

Aiello goes on to describe what asymmetric encryption is and what it is used for (primarily secure online exchanges via SSL – Secure Sockets Layer).

Various types of encryption are used in conjunction. Symmetric is fast, easy to use, not CPU-intensive; while asymmetric is very CPU intensive, slow, and harder to encrypt.

Watch the full video on our site.

View other videos in the data encryption series here, and check back as we continue to update!

What Role Does Encryption Play in Data Security?

What Role Does Encryption Play in Data Security? View video on our site.

Learn more about encryption of data at rest and in transit on our Defense in Depth page.

The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using encryption in the cloud.

Encrypted Cloud Data

Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a full arsenal of security services for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.

Download our latest white paper, Encryption of Cloud Data.

About Otava

Otava provides the secure, compliant hybrid cloud solutions demanded by service providers, channel partners and enterprise clients in compliance-sensitive industries. By actively aggregating best-of-breed cloud companies and investing in people, tools, and processes, Otava’s global footprint continues to expand. The company provides its customers in highly regulated disciplines with a clear path to transformation through its effective solutions and broad portfolio of hybrid cloud, data protection, disaster recovery, security and colocation services, all championed by an exceptional support team. Learn more at www.otava.com.

Get in touch with an Otava Rep today – just provide us with a bit of information below to get started and we’ll reach out to you shortly!