From access control to pseudonymization and everything in between – we delve into methods and technologies to help you secure sensitive data in the cloud.
Fear the NSA or other infiltration threats? We break down different approaches IT pros can take to encrypt data at rest in the public cloud, including service-managed keys, customer-managed keys, bring-your-own keys, and hold-your-own keys.