Cover Image
市場調查報告書

硬體設備為基礎的加密技術

Hardware Based Encryption

出版商 ABI Research 商品編碼 335350
出版日期 內容資訊 英文 25 Pages
商品交期: 最快1-2個工作天內
價格
如有價格方面的疑問請按下「詢問」鍵來信查詢
Back to Top
硬體設備為基礎的加密技術 Hardware Based Encryption
出版日期: 2015年07月16日 內容資訊: 英文 25 Pages
簡介

本報告提供保存在HDD和USB記憶卡、隨身碟等物理媒體的資訊「Data at rest(保存資料)」適用的硬體設備為基礎的加密技術的促進要素,及現在使用的加密研究分析,主要播放器分析等。

第1章 加密:資料安全的最後防線

  • 所謂加密/密碼
  • 硬體設備為基礎的加密技術帶來的大幅度效能改善
  • 活化硬體設備為基礎的加密技術市場的資料侵害
  • 遵守法規必要條件

第2章 重要資料保護的硬體設備為基礎的密碼的動向

  • 加密硬體設備、磁碟驅動器/全光碟加密
  • 加密USB驅動器
  • DES密碼老化
  • AES密碼
  • RSA密碼
  • 橢圓曲線密碼系統
  • 加密的短期性課題
  • 加密的未來:量子金鑰傳輸
  • 雲端加密技術
  • 密碼鎖的管理:大型關注議題
  • 硬體設備安全、模組
  • 硬體設備為基礎的加密技術擴大的需求

第3章 供應商間的合作成功的關鍵

  • IronKey by Imation
  • WinMagic
  • Vormetric
  • SanDisk
  • Seagate Technology
  • Rambus
目錄
Product Code: AN-1592

This analysis is primarily focused on hardware-based encryption techniques applied to “Data at rest” i.e. information stored on permanent media, such as hard disk drives, USB memory sticks, and flash drives. The first section explores trends that are driving the adoption of hardware-based encryption techniques. The second section discuses hardware encrypted hard drives, self-encrypting drives, and USB flash drives. The section also analyzes currently used encryption algorithms like RSA, AES, etc. as well as futuristic encryption technologies like Quantum Key Distribution. The final chapter provides an analysis of different players in the market and includes a review of six companies: IronKey (by Imation), WinMagic, Vormetric, SanDisk, Seagate, and Rambus.

Table of Contents

1. ENCRYPTION: THE ULTIMATE LINE OF DEFENSE FOR DATA SECURITY

  • 1.1. What Is Encryption / Cryptography?
  • 1.2. Hardware-based Encryption Offers Significant Performance Improvements
  • 1.3. Data Breaches Driving Hardware-based Encryption Market
  • 1.4. Complying With Regulatory Requirements

2. MOVING TOWARD HARDWARE-BASED CRYPTOGRAPHY FOR SECURING SENSITIVE DATA

  • 2.1. Hardware-encrypted Disk Drives / Full Disk Encryption
  • 2.2. Hardware-encrypted USB Drives
  • 2.3. Aging DES Encryption
  • 2.4. AES Encryption
  • 2.5. RSA Encryption
  • 2.6. Elliptical Curve Cryptography
  • 2.7. The Near-term Challenges of Encryption
  • 2.8. The Future of Encryption: Quantum Key Distribution
  • 2.9. What about Cloud Encryption Technology?
  • 2.10. Encryption Key Management: A Major Concern
  • 2.11. Hardware Security Module
  • 2.12. Demand for Hardware-based Encryption Set to Increase

3. COLLABORATION BETWEEN VENDORS KEY TO SUCCESS

  • 3.1. IronKey by Imation
  • 3.2. WinMagic
  • 3.3. Vormetric
  • 3.4. SanDisk
  • 3.5. Seagate Technology
  • 3.6. Rambus

Tables

  • 1. Symmetric Encryption and Asymmetric Encryption
  • 2. Regulatory Compliance and Role of Encryption
  • 3. Hardware-encrypted Hard Disk Drives Market Revenue, World Market, Forecast: 2015 to 2020
  • 4. Hardware-encrypted USB Drives Market Revenue, World Market, Forecast: 2015 to 2020
  • 5. Total Hardware Encryption Market Revenue, World Market, Forecast: 2015 to 2020

Charts

  • 1. Frequency of Incident Classification Patterns across Security Incidents, Type of Breach, 2014
  • 2. Hardware-encrypted Hard Disk Drives Market Revenues, World Market, Forecast: 2015 to 2020
  • 3. Hardware-encrypted USB Drives Market Revenue, World Market, Forecast: 2015 to 2020
  • 4. Global Hardware Encryption Market, World Market, Forecast: 2015 to 2020
Back to Top