Category



Latest Blogs

All Blogs »

Encrypting Data at Rest With Pre-Boot Authentication

June 30, 2016 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

When it comes to encrypting data at rest on a laptop or desktop, enterprises can choose to employ software-, hardware- or user-driven pre-boot authentication (PBA) methods. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details each approach and explains why using Trusted Platform Modules (TPMs) is likely the most effective strategy.

IANS

— CLIENT PORTAL —

LOCKED CONTENT
Please Login to continue



Related Research

2/23/2017 | Written AAE
Best Practices for Managing Keys


12/13/2016 | Written AAE
Detailing Technical Considerations For Implementing Tokenization Solutions


10/20/2016 | Written AAE
Assessing Key Management Services Within AWS


7/18/2016 | Faculty Report
The Death of SSL/TLS and Rise of Blockchain: Considering Future Models of Trust