Simply put: encryption is the most effective way for security professionals to protect their data. But, once you decide to encrypt, the question stops becoming “why” and becomes “how.” There are many different use cases in which sensitive data can reside, and thus there are seemingly endless ways to protect your data. These techniques include: full disk encryption, database encryption, file-level encryption, tokenization, dynamic data masking, and static data masking. And this is just naming a few.
Confused? Don’t worry, all of these choices can be overwhelming. If you are just getting started with your encryption program, I recommend reading Cracking the Confusion: Encryption and Tokenization for Data Centers, Servers, and Applications, by leading security analyst firm, Securosis. If you’re looking for a summary, please check out our Selecting the Right Encryption Approach web page.