
{"id":2686,"date":"2013-10-18T00:00:00","date_gmt":"2013-10-18T00:00:00","guid":{"rendered":"http:\/\/otava.test\/data-encryption-video-challenges-to-encrypting-data\/"},"modified":"2013-10-18T00:00:00","modified_gmt":"2013-10-18T00:00:00","slug":"data-encryption-video-challenges-to-encrypting-data","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/","title":{"rendered":"Data Encryption Video: Challenges to Encrypting Data"},"content":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by explaining the many challenges to encrypting data and walking through best practices for a high level of data security.<\/p>\n<p>There are many different levels at which you need to encrypt your data. Strong security means thinking about physical security &#8211; if someone is able to gain physical access to your server or data center, they can potentially decrypt your data if they steal the device. Using disk-level encryption of data at rest helps protect against physical theft of data. If someone were to pull out a few drives from a storage array, they wouldn&#8217;t be able to recover any of the data.<\/p>\n<p>Aiello also describes the challenges with commercial software and <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">encryption<\/a>. Another challenge is the administration of the server. One question to ask is if your <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">cloud provider<\/a> allows you the option of using a VPN (Virtual Private Network) so you can manage your own servers securely.<\/p>\n<p><strong><a href=\"https:\/\/www.onlinetech.com\/resources\/wiki\/encryption-wiki\/challenges-to-encrypting-data\">Watch the full video on our site.<\/a><\/strong><\/p>\n<figure style=\"width: 480px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.onlinetech.com\/resources\/wiki\/encryption-wiki\/challenges-to-encrypting-data\"><img loading=\"lazy\" decoding=\"async\" class=\" \" title=\"Challenges to Encrypting Data View video on our site.\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\" alt=\"Challenges to Encrypting Data View video on our site.\" width=\"480\" height=\"360\" \/><\/a><figcaption class=\"wp-caption-text\">Challenges to Encrypting Data View video on our site.<\/figcaption><\/figure>\n<hr \/>\n<p>Learn more about encryption of data at rest and in transit on our\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Defense in Depth<\/a>\u00a0page.<\/p>\n<p>The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">encryption in the cloud<\/a>.<\/p>\n<p><a href=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Encrypted Cloud Data\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\" alt=\"Encrypted Cloud Data\" width=\"239\" height=\"186\" \/><\/a><\/p>\n<p>Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">full arsenal of security services<\/a>\u00a0for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.<\/p>\n<p>Download our latest white paper,<strong>\u00a0<em><a href=\"https:\/\/web.otava.com\/is-your-encryption-providing-the-right-protection\">Encryption of Cloud Data<\/a><\/em>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by explaining the many challenges to encrypting data and walking through best practices for a high level of data security. There are many different levels at which you need to encrypt your data. Strong security means thinking about physical security &#8211; if someone is able to gain physical access to your server or data center, they can potentially decrypt your data if they steal the device. Using disk-level encryption of data at rest helps protect against physical theft of data. If someone were to pull out a few drives from a storage array, they wouldn&#8217;t be able to recover any of the data. Aiello also describes the challenges with commercial software and encryption. Another challenge is the administration of the server. One question to ask is if your cloud provider allows you the option of using a VPN (Virtual Private Network) so you can manage your own servers securely. Watch the full video on our site. Learn more about encryption of data at rest and in transit on our\u00a0Defense in Depth\u00a0page. The increased cyber threats of hackers and data theft presents a strong&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2686","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Encryption Video: Challenges to Encrypting Data | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Encryption Video: Challenges to Encrypting Data\" \/>\n<meta property=\"og:description\" content=\"Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by explaining the many challenges to encrypting data and walking through best practices for a high level of data security. There are many different levels at which you need to encrypt your data. Strong security means thinking about physical security &#8211; if someone is able to gain physical access to your server or data center, they can potentially decrypt your data if they steal the device. Using disk-level encryption of data at rest helps protect against physical theft of data. If someone were to pull out a few drives from a storage array, they wouldn&#8217;t be able to recover any of the data. Aiello also describes the challenges with commercial software and encryption. Another challenge is the administration of the server. One question to ask is if your cloud provider allows you the option of using a VPN (Virtual Private Network) so you can manage your own servers securely. Watch the full video on our site. Learn more about encryption of data at rest and in transit on our\u00a0Defense in Depth\u00a0page. The increased cyber threats of hackers and data theft presents a strong...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-18T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Data Encryption Video: Challenges to Encrypting Data\",\"datePublished\":\"2013-10-18T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/\"},\"wordCount\":328,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/\",\"url\":\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/\",\"name\":\"Data Encryption Video: Challenges to Encrypting Data | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"datePublished\":\"2013-10-18T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Encryption Video: Challenges to Encrypting Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Encryption Video: Challenges to Encrypting Data | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/","og_locale":"en_US","og_type":"article","og_title":"Data Encryption Video: Challenges to Encrypting Data","og_description":"Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by explaining the many challenges to encrypting data and walking through best practices for a high level of data security. There are many different levels at which you need to encrypt your data. Strong security means thinking about physical security &#8211; if someone is able to gain physical access to your server or data center, they can potentially decrypt your data if they steal the device. Using disk-level encryption of data at rest helps protect against physical theft of data. If someone were to pull out a few drives from a storage array, they wouldn&#8217;t be able to recover any of the data. Aiello also describes the challenges with commercial software and encryption. Another challenge is the administration of the server. One question to ask is if your cloud provider allows you the option of using a VPN (Virtual Private Network) so you can manage your own servers securely. Watch the full video on our site. Learn more about encryption of data at rest and in transit on our\u00a0Defense in Depth\u00a0page. The increased cyber threats of hackers and data theft presents a strong...","og_url":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/","og_site_name":"OTAVA","article_published_time":"2013-10-18T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Data Encryption Video: Challenges to Encrypting Data","datePublished":"2013-10-18T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/"},"wordCount":328,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/","url":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/","name":"Data Encryption Video: Challenges to Encrypting Data | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","datePublished":"2013-10-18T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/data-encryption-video-challenges-to-encrypting-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Data Encryption Video: Challenges to Encrypting Data"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2686"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2686\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2686"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}