Security News > 2021 > June > Reimagining enterprise cryptography: How to regain control in a fragmented environment
From siloed to unified key management: Legacy key protection and management was comprised of different solutions for different environments and business problems.
From disparate to integrated key management and key protection: Legacy key protection provides only basic management and dedicated key management solutions are often not integrated with key protection.
From key theft to key misuse prevention: Legacy key protection solutions address the problem of key theft only.
Using MPC, the secret key is generated in two or more parts called shares, so that all shares are needed to get any information about the key.
What's needed to address these areas is a new platform-based approach to securing enterprise cryptographic infrastructures, one that virtualizes cryptographic key stores and provides a layer of abstraction that delivers cryptographic services to applications, wherever they are: an engine that is a distributed environment that builds a mesh of cryptographic key stores of all types, delivering on-demand cryptographic services at the edge.
Critically too, any such solution must deliver a unified approach to key storage, enabling organizations to enjoy its own features and capabilities while being free to choose the key store best suited to their needs.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/7EuiVboCEGQ/