Colt Wiki

What is Encryption?

Also known as: Data scrambling

Encryption is a way of ‘scrambling’ data to ensure that only the right people, or devices, can understand the information. In simple terms, encryption converts easily readable plaintext into something incomprehensible, whic is known as ciphertext. A cryptographic key is a string of characters used within an encryption algorithm for altering data so that it appears random. Like a physical key, it locks (encrypts) data so that only someone with the right key can unlock (decrypt) it.

Effective network security relies on multiple layers of defense, not just at the edge and core of the network but also along the network path. While much of the focus on security is on users and applications, protecting in-flight data as it travels across the network is a critical component of a holistic security strategy.

The expansion in the volume of sensitive information being stored and transmitted by many organisations shows no sign of abating, whilst the Internet and cloud computing present new challenges. This has led to new risks, whilst data breaches – both accidental and malicious – have grown in frequency, severity and business impact. Security breaches impact network availability, which results in disruption to normal business activity and significant business cost. A loss of customers affects revenues directly and reputational damage can seriously affect the customer retention and growth prospects of a business.

Physically securing networks can be extremely challenging, and even if a rack or room can be secured, data itself must traverse disparate systems and locations. In Europe, the General Data Protection Regulation (GDPR) came into effect in May 2018, requiring all companies that process personal data to comply with its provisions or face stiff penalties in the event of a data breach. And in the US, 47 states now have laws requiring notification of data breaches involving personal information. 29 states have laws that explicitly require entities to destroy, dispose, or make personal information unreadable/ undecipherable. As global regulators increasingly address the pressing need for information security, businesses need to adopt a coherent and holistic strategy across their technology infrastructure.

Recommended content for you

Close up of hand using a mobile phone and typing on a keyboard

Reflecting on our accessibility journey

By Rachel Collins, Head of Diversity, Equity & Inclusion at Colt The third Thursday of each May is Global Accessibility Awareness Day. This time last year, Colt kickstarted its journey to get everyone talking, thinking, ...
Read More

Colt Technology Services Collaborates with Infosys to Accelerate its Digital Transformation Program

New collaboration aims to expedite Colt’s ongoing digital transformation program Colt’s customers set to benefit from easier, faster access to a wide range of integrated global IT, cloud and digital infrastructure services including Network-as-a-Service   ...
Read More

A strategic partnership provides the foundation for rapid evolution with powerful SD WAN and SASE service

The customer: A growing European and Canadian equipment service provider TIP Group is one of Europe and Canada’s leading equipment service providers. Founded in 1968, it operates from more than 130 locations across 18 countries ...
Read More

Flexibly supporting an expanding business with resilient networking

The customer: An ambitious legal company DAC Beachcroft is a leading international legal business with more than 2,600 people in locations across the UK, Europe, Asia-Pacific and Latin America. It takes a partnership approach with ...
Read More
This man is walking past a data centre with his laptop.

Global manufacturing company trusts Colt for critical connectivity between the Middle East and Europe

The customer: A household name in manufacturing with operations worldwide, including a long-standing presence in the Middle East. Previously, its sites in the Middle East were responsible for sourcing their own connectivity solutions. They used ...
Read More

Tackling the huge growth in internet traffic with simple, cost-effective 400G IP transit ports

The customer: A fast-growing international carrier based in Germany Core-Backbone GmbH is an established and rapidly growing carrier headquartered in Germany, operating a global network on three continents. For more than 15 years, it has ...
Read More