Data Encryption, Cryptography
Flexible Encryption and Cryptography in eCatalog
Robust Default and Customizable Security Options:
- Default Cryptographic Standard
eCatalog comes pre-installed with Advanced Encryption Standard (AES), a globally recognized encryption method known for its strength and efficiency in securing digital data. AES is widely used across various industries due to its ability to ensure a high level of security. - Customizable and Upgradable Cryptographic Standards
Understanding that different organizations may have unique security needs, eCatalog offers the flexibility to integrate various cryptographic modules: - TwoFish and BlowFish
Alongside AES, eCatalog supports other robust encryption methods like TwoFish and BlowFish, known for their effectiveness and security. - Client-Specific Customization
eCatalog can be tailored to include any cryptographic method preferred by the client, providing a truly customizable security solution.
Licensing and Installation:
By default, additional cryptographic modules are not pre-installed and might require an additional license. This allows organizations to choose only the necessary encryption standards needed for their operations, optimizing system performance and cost.
Encryption Methodology:
- Dual-Key Encryption
eCatalog employs a dual-key system to maximize data security: - Application-Level Key
This key can be regenerated by administrators at any time, allowing for flexible and dynamic security management. - Company-Level Key
Designed to remain constant to ensure data continuity. Changing the company-level key would render all previously encrypted data unreadable, thus it is recommended to maintain its integrity. - Unique Encryption Outputs
Each instance of encrypted data is unique, even if the input data (e.g., passwords) are identical. This approach uses cryptography salting to enhance security, making it extremely difficult for attackers to exploit patterns. - Periodic Key Rotation
Administrators have the option to configure eCatalog to periodically reset the application-level cryptography key. This practice disrupts potential pattern recognition and significantly enhances security against brute-force attacks.
Security Enhancements and Configurations:
The flexibility in configuring cryptography settings in eCatalog ensures that the system can adapt to evolving security landscapes and organizational requirements. This capability not only enhances data protection but also aligns with best practices for data encryption and compliance with regulatory standards.
Navigating Encryption Settings:
Administrators can access and modify the cryptography settings through the eCatalog’s security management dashboard. This centralized approach allows for effective management of encryption standards, ensuring that the system remains secure and compliant with the latest security protocols.