
{"id":2671,"date":"2013-10-09T00:00:00","date_gmt":"2013-10-09T00:00:00","guid":{"rendered":"http:\/\/otava.test\/video-how-is-data-encryption-deployed-today\/"},"modified":"2013-10-09T00:00:00","modified_gmt":"2013-10-09T00:00:00","slug":"video-how-is-data-encryption-deployed-today","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/","title":{"rendered":"Video: How is Data Encryption Deployed Today?"},"content":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello\u00a0continues his data security series of videos on data encryption by explaining how encryption is deployed today and the two different types of decrypting data.<\/p>\n<p><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">Encryption<\/a>\u00a0involves a series of different mathematical formulas that are applied to character data. You can use either substitution or transposition. Substitution is the example of B=A, A=C. Transposition is scrambling the letters &#8211; for example, take the word &#8216;cat.&#8217; Switching the position of the first letter to the third letter, and the third letter to the first letter results in &#8216;tac.&#8217; So, cat = tac.<\/p>\n<p>Many strong encryption algorithms will use a combination of both substitution and transposition. Depending on the type of technology and device you use, the type of algorithms that are being used will be different for each. For example, mobile phones have very low power availability, therefore, mobile phones and desktop PCs would use different encryption methods.<\/p>\n<p><a href=\"https:\/\/www.onlinetech.com\/resources\/wiki\/encryption-wiki\/how-is-data-encryption-deployed-today\">Watch the full video on our site.<\/a><\/p>\n<p>View other videos in the data encryption series <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/videos\/\">here<\/a>, and check back as we continue to update!<\/p>\n<figure style=\"width: 480px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.onlinetech.com\/resources\/wiki\/encryption-wiki\/how-is-data-encryption-deployed-today\"><img loading=\"lazy\" decoding=\"async\" title=\"How is Data Encryption Deployed Today? View video on our site.\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\" alt=\"How is Data Encryption Deployed Today? View video on our site.\" width=\"480\" height=\"360\" \/><\/a><figcaption class=\"wp-caption-text\">How is Data Encryption Deployed Today? View video on our site.<\/figcaption><\/figure>\n<hr \/>\n<p>Learn more about encryption of data at rest and in transit on our <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Defense in Depth<\/a> page.<\/p>\n<p><a href=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Encrypted Cloud Data\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\" alt=\"Encrypted Cloud Data\" width=\"239\" height=\"186\" \/><\/a><\/p>\n<p>The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">encryption in the cloud<\/a>.<\/p>\n<p>Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">full arsenal of security services<\/a>\u00a0for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.<\/p>\n<p>Download our latest white paper,<strong>\u00a0<em><a href=\"https:\/\/web.otava.com\/is-your-encryption-providing-the-right-protection\">Encryption of Cloud Data<\/a><\/em>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello\u00a0continues his data security series of videos on data encryption by explaining how encryption is deployed today and the two different types of decrypting data. Encryption\u00a0involves a series of different mathematical formulas that are applied to character data. You can use either substitution or transposition. Substitution is the example of B=A, A=C. Transposition is scrambling the letters &#8211; for example, take the word &#8216;cat.&#8217; Switching the position of the first letter to the third letter, and the third letter to the first letter results in &#8216;tac.&#8217; So, cat = tac. Many strong encryption algorithms will use a combination of both substitution and transposition. Depending on the type of technology and device you use, the type of algorithms that are being used will be different for each. For example, mobile phones have very low power availability, therefore, mobile phones and desktop PCs would use different encryption methods. Watch the full video on our site. View other videos in the data encryption series here, and check back as we continue to update! Learn more about encryption of data at rest and in transit on our Defense in Depth page. The increased cyber threats of hackers and&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2671","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Video: How is Data Encryption Deployed Today? | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Video: How is Data Encryption Deployed Today?\" \/>\n<meta property=\"og:description\" content=\"Online Tech&#8217;s Senior Product Architect Steve Aiello\u00a0continues his data security series of videos on data encryption by explaining how encryption is deployed today and the two different types of decrypting data. Encryption\u00a0involves a series of different mathematical formulas that are applied to character data. You can use either substitution or transposition. Substitution is the example of B=A, A=C. Transposition is scrambling the letters &#8211; for example, take the word &#8216;cat.&#8217; Switching the position of the first letter to the third letter, and the third letter to the first letter results in &#8216;tac.&#8217; So, cat = tac. Many strong encryption algorithms will use a combination of both substitution and transposition. Depending on the type of technology and device you use, the type of algorithms that are being used will be different for each. For example, mobile phones have very low power availability, therefore, mobile phones and desktop PCs would use different encryption methods. Watch the full video on our site. View other videos in the data encryption series here, and check back as we continue to update! Learn more about encryption of data at rest and in transit on our Defense in Depth page. The increased cyber threats of hackers and...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-09T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Video: How is Data Encryption Deployed Today?\",\"datePublished\":\"2013-10-09T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/\"},\"wordCount\":335,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/\",\"url\":\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/\",\"name\":\"Video: How is Data Encryption Deployed Today? | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"datePublished\":\"2013-10-09T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Video: How is Data Encryption Deployed Today?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Video: How is Data Encryption Deployed Today? | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/","og_locale":"en_US","og_type":"article","og_title":"Video: How is Data Encryption Deployed Today?","og_description":"Online Tech&#8217;s Senior Product Architect Steve Aiello\u00a0continues his data security series of videos on data encryption by explaining how encryption is deployed today and the two different types of decrypting data. Encryption\u00a0involves a series of different mathematical formulas that are applied to character data. You can use either substitution or transposition. Substitution is the example of B=A, A=C. Transposition is scrambling the letters &#8211; for example, take the word &#8216;cat.&#8217; Switching the position of the first letter to the third letter, and the third letter to the first letter results in &#8216;tac.&#8217; So, cat = tac. Many strong encryption algorithms will use a combination of both substitution and transposition. Depending on the type of technology and device you use, the type of algorithms that are being used will be different for each. For example, mobile phones have very low power availability, therefore, mobile phones and desktop PCs would use different encryption methods. Watch the full video on our site. View other videos in the data encryption series here, and check back as we continue to update! Learn more about encryption of data at rest and in transit on our Defense in Depth page. The increased cyber threats of hackers and...","og_url":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/","og_site_name":"OTAVA","article_published_time":"2013-10-09T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Video: How is Data Encryption Deployed Today?","datePublished":"2013-10-09T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/"},"wordCount":335,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/","url":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/","name":"Video: How is Data Encryption Deployed Today? | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","datePublished":"2013-10-09T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Video: How is Data Encryption Deployed Today?"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2671"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2671\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2671"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}