Category



Latest Blogs

All Blogs »

Encrypting Data at Rest With Pre-Boot Authentication

June 30, 2016 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

When it comes to encrypting data at rest on a laptop or desktop, enterprises can choose to employ software-, hardware- or user-driven pre-boot authentication (PBA) methods. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details each approach and explains why using Trusted Platform Modules (TPMs) is likely the most effective strategy.

IANS

— CLIENT PORTAL —

LOCKED CONTENT
Please Login to continue



Related Research

5/10/2017 | Written AAE
Implementing Contactless MFA across a PKI Environment


3/29/2017 | Written AAE
Choosing the Right MFA and PKI Solution for a Complex, High-Security Environment


2/23/2017 | Written AAE
Best Practices for Managing Keys


12/13/2016 | Written AAE
Detailing Technical Considerations For Implementing Tokenization Solutions


10/20/2016 | Written AAE
Assessing Key Management Services Within AWS