3 reasons to choose robust network encryption – high-assurance, end-to-end, and authenticated network encryption.
Robust encryption protects against breaches and vulnerable devices!
Whatever the weakness or network device vulnerability – and many are exposed daily – only high-assurance robust encryption will protect data from breaches. Only end-to-end authenticated encryption using ‘client-side’ key management give you that assurance.
Key Security issues:
Both the US federal government auditors’ fury about firewall weaknesses said to render it ineffective; and the network device ‘back door’ vulnerability horror stories send a critically important message – ‘robust’ encryption is not negotiable when sensitive data and stakeholders’ security are at stake.
It is likely that there will always be vulnerabilities in data networks and IT systems. But the network data itself need not be vulnerable. If the network encryption solution used is high-assurance – true end-to-end and authenticated using standards based encryption; and the key management is state-of-the-art ‘client-side’ – data breaches will only result in meaningless encrypted data.
Whatever data security prevention tools you use, it is only a matter of when a network data breach will occur – not if a breach will occur!
You, your customers, partners, shareholders, staff and other stakeholders can only be assured sensitive network transmitted data is safe from unauthorised parties. The alternative is the potential for a catastrophic data breach.
Although the two stories highlighted and addressed very serious flaws in the security products (in both cases) and the yet to be explained FIPS certification issue (in one case); their data security significance is much more fundamental to all data networks users.
Cyber-crime, cyber-terrorism and cyber-attacks are not just common but are one of the largest single costs to governments and businesses today. The damage is often catastrophic, very harmful to citizens and is likely continue for years.
Specifically, the significance is that, in the case of protecting data transmitted across networks, security prevention and network devices (including low assurance routers and switches with embedded encryption) may always be vulnerable to advanced attacks.
That is why security experts encourage all organisations to ensure that if a network breach occurs, the sensitive data itself is safe because it will be meaningless data.
However, that safety assurance is best achieved through the use of high-assurance end-to-end network encryption. As high-assurance encryption it is authenticated and uses state-of-the-art (client side) encryption key management.
Sure the US congress is right to be concerned that network devices that seemed to have been FIPS certified (US government certification requirement) and yet have been confirmed as having serious vulnerabilities to cyber-attacks. And certainly the US auditor general’s department should be furious that a security prevention product has been discovered to have not provided the required protection.
But, if the affected relevant government agencies are on the ball, they will be using high-assurance encryption for their network transmitted data as well as their data at rest. If a breach occurs the sensitive data will be safe and useless in the hands of any unauthorised party.