Database Encryption - Defining the Root of Trust

  • Webcast Aired Friday, 19 Sep 2014 1:00PM EDT (19 Sep 2014 17:00 UTC)
  • Speakers: Andreas Philipp, Greg Porter

Today, industries across a slew of different verticals seek advanced security through database encryption to secure, authenticate and enable sensitive infrastructures and data. At the core of these industries lies the need to secure sensitive consumer, corporate and citizen data, as well as advanced IP-based networks in the face of connected devices and the Internet of Things. These sectors and industries include:

  • Public Sector to protect citizen privacy
  • eHealth to protect patient data and diagnostic information
  • Financial Services to protect credit card data and other sensitive payment information

Worldwide database encryption is a well regulated and standardized field of application. Certification schemas based on FIPS-validated key storage are defined (e.g. PCI-DSS), as well as APIs for security devices in different kinds of database products.

In this Webcast, Andreas Philipp, vice president of business development at Utimaco, will give an overview of different kinds of application scenarios and best practices of database encryption based on Hardware Security Modules (HSM). HSMs provide a hardware root of trust by managing cryptographic keys to ensure tamper-proof protection and prevent third-party data breaches.