Selecting Encryption for "Data at Rest" in Back-End Systems

Provided by Thales eSecurity, Inc.

Category Security

Type White Paper

Length 12

Publish Date June 30 2015

Date posted April 26 2017


Increasingly, organizations are relying on security technology that has proven effective in one area to work as a solution in another. However, this can often leave companies vulnerable to attack as a ‘one size fits all’ approach is rarely effective. Knowing what risks you are trying to address and finding a technology that works to specifically mitigate that problem is the only way to ensure complete protection. This paper looks at why you should use an encryption solutions to minimize risks to data at the endpoints and outlines why file-level encryption is a better fit for the risks associated with data at rest for back-end systems.

Recommended for You


US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?