Access Control and Identity Management

Implementations of Business Cryptography

Transport Layer Security (TLS) encryption uses cryptographic techniques to ensure that communications between two points or two parties are authenticated and secure. Many organizations use TLS for secure communications, including Internet applications and virtual private networks (VPNs). When remote access employees need to access specific tools over the Internet, TLS may be used to secure the transmission of data both through Internet applications and VPNs.

Cryptography can be used for encrypting data at rest and data in motion for various business requirements. Examples of cryptography for business purposes are:

  • Encrypting hard drives as a preventive measure ...

Get Access Control and Identity Management, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.