
{"id":2677,"date":"2013-10-15T00:00:00","date_gmt":"2013-10-15T00:00:00","guid":{"rendered":"http:\/\/otava.test\/video-data-encryption-in-transit-vs-at-rest\/"},"modified":"2013-10-15T00:00:00","modified_gmt":"2013-10-15T00:00:00","slug":"video-data-encryption-in-transit-vs-at-rest","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/","title":{"rendered":"Video: Data Encryption in Transit vs. at Rest"},"content":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello\u00a0continues his data security series of videos on data encryption by explaining difference between data encryption in transit vs. at rest and how symmetric and asymmetric encryption are used.<\/p>\n<p>One\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">encryption\u00a0<\/a>algorithm that is popular is AES &#8211; Advanced Encryption Standard. Using symmetric and asymmetric in encryption is important to understand.<\/p>\n<p>With symmetric encryption, your decryption key is the same on both sides. Symmetric key cryptography is when the sender and receiver of a message shares a single key (the same one) to both encrypt and decrypt the message.<\/p>\n<p>(For more Encryption Glossary Terms, download our\u00a0<strong><a href=\"https:\/\/web.otava.com\/is-your-encryption-providing-the-right-protection\">Encryption of Cloud Data white paper<\/a><\/strong>\u00a0today). This type of encryption is used to protect the bulk of our information on the Internet.<\/p>\n<p>Aiello goes on to describe what asymmetric encryption is and what it is used for (primarily secure online exchanges via\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">SSL<\/a>\u00a0&#8211; Secure Sockets Layer).<\/p>\n<p>Various types of encryption are used in conjunction. Symmetric is fast, easy to use, not CPU-intensive; while asymmetric is very CPU intensive, slow, and harder to encrypt.<\/p>\n<p>View other videos in the data encryption series <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/videos\/\">here<\/a>, and check back as we continue to update!<\/p>\n<hr \/>\n<p>Learn more about encryption of data at rest and in transit on our <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Defense in Depth<\/a> page.<\/p>\n<p>The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">encryption in the cloud<\/a>.<\/p>\n<p>Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">full arsenal of security services<\/a>\u00a0for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.<\/p>\n<p>Download our latest white paper,<strong>\u00a0<em><a href=\"https:\/\/web.otava.com\/is-your-encryption-providing-the-right-protection\">Encryption of Cloud Data<\/a><\/em>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello\u00a0continues his data security series of videos on data encryption by explaining difference between data encryption in transit vs. at rest and how symmetric and asymmetric encryption are used. One\u00a0encryption\u00a0algorithm that is popular is AES &#8211; Advanced Encryption Standard. Using symmetric and asymmetric in encryption is important to understand. With symmetric encryption, your decryption key is the same on both sides. Symmetric key cryptography is when the sender and receiver of a message shares a single key (the same one) to both encrypt and decrypt the message. (For more Encryption Glossary Terms, download our\u00a0Encryption of Cloud Data white paper\u00a0today). This type of encryption is used to protect the bulk of our information on the Internet. Aiello goes on to describe what asymmetric encryption is and what it is used for (primarily secure online exchanges via\u00a0SSL\u00a0&#8211; Secure Sockets Layer). Various types of encryption are used in conjunction. Symmetric is fast, easy to use, not CPU-intensive; while asymmetric is very CPU intensive, slow, and harder to encrypt. View other videos in the data encryption series here, and check back as we continue to update! Learn more about encryption of data at rest and in transit on&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2677","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Video: Data Encryption in Transit vs. at Rest | OTAVA<\/title>\n<meta name=\"description\" content=\"We&#039;re explaining the difference between data encryption in transit vs. at rest and how symmetric and asymmetric encryption are used.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Video: Data Encryption in Transit vs. at Rest\" \/>\n<meta property=\"og:description\" content=\"We&#039;re explaining the difference between data encryption in transit vs. at rest and how symmetric and asymmetric encryption are used.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-15T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Video: Data Encryption in Transit vs. at Rest\",\"datePublished\":\"2013-10-15T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/\"},\"wordCount\":335,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/\",\"url\":\"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/\",\"name\":\"Video: Data Encryption in Transit vs. at Rest | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-10-15T00:00:00+00:00\",\"description\":\"We're explaining the difference between data encryption in transit vs. at rest and how symmetric and asymmetric encryption are used.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Video: Data Encryption in Transit vs. at Rest\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Video: Data Encryption in Transit vs. at Rest | OTAVA","description":"We're explaining the difference between data encryption in transit vs. at rest and how symmetric and asymmetric encryption are used.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/","og_locale":"en_US","og_type":"article","og_title":"Video: Data Encryption in Transit vs. at Rest","og_description":"We're explaining the difference between data encryption in transit vs. at rest and how symmetric and asymmetric encryption are used.","og_url":"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/","og_site_name":"OTAVA","article_published_time":"2013-10-15T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Video: Data Encryption in Transit vs. at Rest","datePublished":"2013-10-15T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/"},"wordCount":335,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/","url":"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/","name":"Video: Data Encryption in Transit vs. at Rest | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-10-15T00:00:00+00:00","description":"We're explaining the difference between data encryption in transit vs. at rest and how symmetric and asymmetric encryption are used.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/video-data-encryption-in-transit-vs-at-rest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Video: Data Encryption in Transit vs. at Rest"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2677"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2677\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2677"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}