HP Security Voltage: The Identity-Based Encryption Advantage

Published on
12/12/2019 12:48 PM

This technical brief will define the requirements for a robust key management system, explain why traditional key management architectures do not fully meet these requirements, and introduce a new architecture that uniquely meets all the requirements for an effective enterprise key management system.