Encrypting Sensitive E-Mail Communications: Choosing an Encryption Protocol

Author(s): Gareth Doherty

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

The choice of an encryption key type (i.e. symmetric vs. asymmetric) is a crucial part of the development of an encryption architecture. There are important differences between these key types from both an IT security and a management perspective. Choosing the appropriate key requires weighing an organization's security needs against the cost of implementing and maintaining the chosen encryption solution. This note provides information to assist IT managers in choosing between symmetric and asymmetric key encryption.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019