Hal Merritt wrote:
>I am beginning to think that the silence of major players is meaningful.

>I can report one horror story: pay close attention to your key manangment 
>process. The whole process to include entry, change, and propagation to a 
>recovery site. That whole sand box looks to be very fragile by design. And, 
>without keys, the data is unrecoverable.

>I'm really worried that there are a lot of worthless backups out there that 
>won't be discovered until it is way too late.

Indeed. "Encryption is easy, key management is hard". That's why the Voltage 
solutions all use keynames (identities) defined *by the user* (they look like 
email addresses, and actually are for Voltage SecureMail, but need not be for 
Voltage SecureData). Keys are generated based on a Master Secret and that 
identity *on the fly*. Thus keys need not be backed up, and key servers 
replicated with the same Master Secret will generate the same key for the same 
identity.

Our customers love this flexibility: no constant key server backups, easy 
failover and geographic replication, and applications can share keys by using 
the same identity, without having to pass keys themselves around.

...phsiii

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to