I was wondering if someone could explain the encryption key management process at Norton Zone.
How are the keys generated and where are the keys stored? Does Norton Zone encrypt, decrypt as well as host the Content or is there separation such that Norton does not hold the decryption keys?
Thanks for replying to my question although it wasn't much of an answer.
It is not proprietary to discuss whether there is separation between encryption and storage. In fact it is a very basic question and one to which there is a good answer and a bad answer - it is fairly simple. If Norton does not want to answer then it is likely because it would have been the bad answer.
FOr consumers it is not a big deal, but I was trying to figure out if I could leverage Zone for an enterprise solution - sounds like the answers to the is NO.
Thanks for replying to my question although it wasn't much of an answer.
It is not proprietary to discuss whether there is separation between encryption and storage. In fact it is a very basic question and one to which there is a good answer and a bad answer - it is fairly simple. If Norton does not want to answer then it is likely because it would have been the bad answer.
FOr consumers it is not a big deal, but I was trying to figure out if I could leverage Zone for an enterprise solution - sounds like the answers to the is NO.
Thanks again.
Enterprise solutions are better left to Enterprise products. Trying to make a consumer product fit into the enterprise can bring unexpected, and possibly serious consequences.
I was wondering if someone could explain the encryption key management process at Norton Zone.
How are the keys generated and where are the keys stored? Does Norton Zone encrypt, decrypt as well as host the Content or is there separation such that Norton does not hold the decryption keys?
Thanks for replying to my question although it wasn't much of an answer.
It is not proprietary to discuss whether there is separation between encryption and storage. In fact it is a very basic question and one to which there is a good answer and a bad answer - it is fairly simple. If Norton does not want to answer then it is likely because it would have been the bad answer.
FOr consumers it is not a big deal, but I was trying to figure out if I could leverage Zone for an enterprise solution - sounds like the answers to the is NO.
Thanks for replying to my question although it wasn't much of an answer.
It is not proprietary to discuss whether there is separation between encryption and storage. In fact it is a very basic question and one to which there is a good answer and a bad answer - it is fairly simple. If Norton does not want to answer then it is likely because it would have been the bad answer.
FOr consumers it is not a big deal, but I was trying to figure out if I could leverage Zone for an enterprise solution - sounds like the answers to the is NO.
Thanks again.
Enterprise solutions are better left to Enterprise products. Trying to make a consumer product fit into the enterprise can bring unexpected, and possibly serious consequences.
I was wondering if someone could explain the encryption key management process at Norton Zone.
How are the keys generated and where are the keys stored? Does Norton Zone encrypt, decrypt as well as host the Content or is there separation such that Norton does not hold the decryption keys?