Home
From Wikibon
Line 3: | Line 3: | ||
__NOTOC__ | __NOTOC__ | ||
- | <div style="float:right; width: | + | <div style="float:right; width:180px;"> |
'''[http://wikibon.org/register JOIN WIKIBON]''' to be eligible to win an '''Amazon Kindle!''' | '''[http://wikibon.org/register JOIN WIKIBON]''' to be eligible to win an '''Amazon Kindle!''' | ||
- | [[Image:Kindle-107.jpg|link=http://wikibon.org/wiki/v/Wikibon_Contests]] | + | [[Image:Kindle-107.jpg|margin-left:30px|link=http://wikibon.org/wiki/v/Wikibon_Contests]] |
View our '''[http://wikibon.org/wiki/v/Wikibon_Contests latest contest]''' for new members | View our '''[http://wikibon.org/wiki/v/Wikibon_Contests latest contest]''' for new members |
Revision as of 02:42, 1 October 2009
Latest Peer Incite Research:
Wikibon Highlights:
NEW Wikibon Research:
>>Join our Group | >>Become a Fan | >>Follow @Wikibon | >>Read the Blog |
WikitipExtending Enterprise Key Management to Storage(Source http://xml.coverpages.org/ni2009-02-27-a.html) Brocade, EMC/RSA, HP, IBM, LSI, NetApp, Seagate, and Thales e-Security launched an initiative with OASIS to address the requirements for interoperable key management features for enterprise storage. KMIP (key management interoperability protocol) "establishes a single, comprehensive protocol for communication between enterprise key management servers and cryptographic clients. By defining a protocol that can be used by any cryptographic client, ranging from a simple automated electric meter to very complex disk-arrays, KMIP enables enterprise key management servers to communicate via a single protocol to all cryptographic clients supporting that protocol. Through vendor support of KMIP, an enterprise will be able to consolidate key management in a single enterprise key management system, reducing operational and infrastructure costs while strengthening operational controls and governance of security policy. KMIP addresses the critical need for a comprehensive key management protocol built into the information infrastructure, so that enterprises can deploy effective unified key management for all their encryption, certificate-based device authentication, digital signature, and other cryptographic capabilities." Initial supporting entities for KMIP included Brocade, Cisco, EMC/RSA, HP, IBM, LSI, NetApp, Seagate, and Thales e-Security. Additional statements of support have been received (corporate or individual) from Algorithmic Research (Arx), Axway Software, BeCrypt, CipherOptics, Dajeil, Election Systems and Software, Emulex, Lexmark International, MIT, Mitre Corporation, NIST, Oracle, PayPal, PGP Corporation, Quantum, Red Hat, SafeNet, Skyworth TTG, Sun Microsystems, Symantec, US Department of Defense (DoD), Valicore, Venafi, Verisign, and others. The OASIS KMIP Technical Committee "will develop specification(s) for the interoperability of key management services with key management clients. The specifications will address anticipated customer requirements for key lifecycle management (generation, refresh, distribution, tracking of use, life-cycle policies including states, archive, and destruction), key sharing, and long-term availability of cryptographic objects of all types (public/private keys and certificates, symmetric keys, and other forms of "shared secrets") and related areas." The problem addressed by KMIP, according to the published FAQ document, is "primarily that of standardizing communication between encryption systems that need to consume keys and the key management systems that create and manage those keys. Being able to encrypt and retain access to data requires that encryption keys be generated and stored. To date, organizations deploying encryption have not been able to take advantage of interoperability across encryption and the key management systems. By defining a low-level protocol that can be used to request and deliver keys between any key manager and any encryption system, KMIP enables the industry to have any encryption system communicate with any key management system. Through this interoperability, companies will be able to deploy a single enterprise key management infrastructure to manage keys for all encryption systems in the enterprise that require symmetric keys, asymmetric keys pairs, certificates and other security objects..."
|
Featured Case StudyFinancial giant goes greenThe corporate IT group of a very large, worldwide financial organization with 100,000 employees, has initiated an ongoing “greening” process. This is focused largely on reducing energy use both to decrease the corporation's carbon footprint while creating a net savings in operational costs over the lifetime of new, more energy-efficient equipment, including new storage systems. |
|
Featured How-To Note |
Planning a Green Storage InitiativeFluctuating energy prices have heightened electricity and energy consumption as a major issue within the technology community. IT is a significant consumer of energy and IT energy costs have been rising disproportionately because of continued investment in denser IT equipment. Estimates from the EPA and others indicate that IT will account for 3% of energy consumption by 2012. |