25.08.2015 Views

GSN Aug/Sept Digital Edition

  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Protecting data in motion:A look at data encryptionContinued from page 33at any of the layers within the communicationsubsystem. As volumesincrease, and the network demandsrise, you’ll need to think about moreefficient approaches to data in motionencryption – namely what’sknown as Layer 2 (data link layer)or Layer 3 (network layer) encryption.Layer 3 encryption – or IPSecencryption – is a powerful form ofdata encryption. Though, it doeshave a negative effect on networkperformance and throughput. Italso needs more effort to manage.Layer 3 usually takes up 30%-40%of a network’s throughput. Eventhough dedicated networks canhandle this kind of overhead, it canbe expensive to run Layer 3 encryptionacross public networks. In generalit’s more likely that you will useLayer 2 encryption on high-speednetworks with greater bandwidthdemands.In fact, Layer 2 encryption is beingused more worldwide becauseit’s the most effective way to encryptdata at the lowest layer possible.Security requirements andthe demands on network speed andperformance make Layer 2 the clearchoice.Layer 2 encryption is used inpoint-to-point, meshed, virtual privatenetworks and multiprotocollabel switching. Use of Layer 2 encryptionenables the usage of othersecurity mechanisms such as TrafficFlow Security for further protectionof your data in motion.Security deployments within anorganization’s infrastructure oftenlag behind methods used by hackersto access networks. Instead of tryingto protect the network from almostinevitable unauthorized access, youshould instead be protecting yourdata in motion with encryption.That’s the best way to reduce thedamage of potential network intrusion.Encryption technology can helpmanage the risks associated withnetwork security breaches muchmore simply and cost-effectivelythan ever before. When you use thebest possible encryption technologyfor data, whether in motion or atrest, you can be sure that anything acyber-criminal gets his or her handson can’t be used against you or anyof your network’s users.Shawn Campbell is Vice President,Product Management at SafeNetAssured Technologies. He can bereached at shawn.campbell@safenetAT.com.New from GovPost Your Video on tin HomelanCheck out this new video abduring a successful searYour Video Pos732-233-8119 mmadVideo Pricing48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!