Welcome Guest | My Membership | Login

Data Encryption at Rest


Summary

Files containing wireless contracts, customer names, customer addresses, and credit card details were found in a recycling bin. Personal data — 3.3 million names, addresses, dates of birth and Social Security numbers — have been exposed due to stolen portable media devices.

Do I have your attention now?

Data security issues should be of concern to anyone managing data, particularly when it contains PII (Personally Identifiable Information) or credit card information. This article will show you how Reality solves these concerns and minimizes the risk of data falling into the wrong hands using its Data Encryption at Rest functionality.

What is Data Encryption at Rest?

This term is used for any data that is physically encrypted and stored on some sort of medium — such as a hard drive, thumb drive or even a magnetic tape — and is decrypted on-the-fly when an authorized user unlocks the data using a defined key to access it.

Reality's Data Encryption at Rest is integrated into its user-based security system, making it very easy to administer. We provide tools for managing the keys that unlock your encrypted data. So let's start by reviewing that security model.

Read More...

Social Media Login

Use your existing social media logins to access your Membership/Subscription information.

Existing Magazine/Newsletter Subscriber (Quick Access)

If you are an existing International Spectrum subscriber, but have not registered with the website, please enter the Reference Code found on the magazine or in the e-mails you receive from us.

Magazine Reference Code location

Spectrum Login

New Subscriber

If you currently do not receive the Magazine or other emails from International Spectrum, select the "Subscribe" button below to create an new membership account.


 

Find out more about the different between the FREE and a Professional Membership at:
Compare Account Options

 

# # #          # # #          # # #

 

Related Articles

  • From The Inside: November/December 2015

    Company: International Spectrum

    The exploration and creation of Next Generation Business Software is on the minds of a lot of business software developers lately. Almost all business software is showing its age. Many applications have been around for 15-20 years, but most of our MultiValue applications have been around for over 30-40. Next Generation Business Software is not just about the client. Nor is it just about the user.

  • Wait! Backup!

    Company: Precision Solutions

    Kevin's impatience is our gain. Hew gives an insight into his backup strategy, which is based on minimizing the wait and minimizing the risk.

  • OAUTH 2 Login with MultiValue BASIC Part 2

    Company: International Spectrum

    Consuming some web services within your MultiValue applications can be easy, but many web services are starting to require OAUTH 2 Login authentication. OAUTH 2 adds an additional complexity but, with a few explanations, it becomes much simpler than the documentation makes it look. This article will talk about what is required to create an OAUTH 2 Login process within your MultiValue application.

  • Business Tech: You Could be an Ostrich Farmer!

    Company: HDWP

    Charles Barouch pulls his head out of the sand and goes looking for the secrets that his co-workers and friends know. It leads to a few unexpected places.

  • 2015 MultiValue Industry End-of-year Recap

    Company: International Spectrum, Kore Technologies, Ladybridge Systems Ltd, Entrinsik, Pick Cloud, Inc, Rocket Software, SJ+ SYSTEMS ASSOCIATES, Onsystex

    The year 2015 continued to provide us with changing technologies and changing market demands. But the economic landscape seemed to improve somewhat. The demand for mobile access to data continued to increase. We asked some of our MultiValue partners to share with us some of their accomplishments from this last year and what to look for in the next.


Return to top