This IDC Perspective identifies six principles that IT executives must understand about the use of encryption technology to protect sensitive information. Different encryption technologies exist to protect data that is stored at rest, in transit over a network, or in use on a computer system. These technologies are complex and require careful configuration and management to ensure that they function properly and are resilient against attack.
"Encryption is an intimidating technology for many IT leaders because it is highly technical and relies upon complex mathematical algorithms. While CIOs can and should leave the details of encryption to their cybersecurity teams, it is important that they have a working knowledge of the technology to provide responsible leadership and oversight," said Mike Chapple, adjunct research analyst, IDC.