A lot has been said about methods of protecting data stored on local computers. A very interesting question raised by many organizations is whether data stored on central file servers requires special protection. Does this data need encryption? What are the risks? What are the mitigation techniques? This paper tries to provide a brief answer to these questions. It also gives a few examples of different encryption solutions and technologies.


Data Encryption Virtual Server File Server Client Computer Encryption Rule 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [Decr05] Decru: DataFort Administration Guide for E-Series DataFort, 2005Google Scholar
  2. [Utim05] Utimaco Safeware A.G.: SafeGuard LAN Crypt Administration, version 3.21, 2005Google Scholar
  3. [Cohe04]
    Cohen, Fred: Database Security: Protecting the Critical Content of the Enterprise, Burton Group, 2004Google Scholar
  4. [RsaS02]
    RSA Security: Securing Data at Rest: Developing a Database Encryption Strategy, 2002Google Scholar
  5. [Henr06]
    Henry, Trent: Rights Management: Driving Security to the Data, Burton Group, 2006Google Scholar
  6. [GrKo03]
    Gruener, Jamie and Kovar, Matthew: Abridged Report, The Emerging Storage Security Challenge, The Yankee Group, 2003Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV Fachverlage GmbH, Wiesbaden 2007

Authors and Affiliations

  • Janusz Gebusia
    • 1
  1. 1.Consulting & Integration Orteliuslaan 1000Hewlett-PackardBD UtrechtNetherlands

Personalised recommendations