Colt Wiki

What is Encryption?

Also known as: Data scrambling

Encryption is a way of ‘scrambling’ data to ensure that only the right people, or devices, can understand the information. In simple terms, encryption converts easily readable plaintext into something incomprehensible, whic is known as ciphertext. A cryptographic key is a string of characters used within an encryption algorithm for altering data so that it appears random. Like a physical key, it locks (encrypts) data so that only someone with the right key can unlock (decrypt) it.

Effective network security relies on multiple layers of defense, not just at the edge and core of the network but also along the network path. While much of the focus on security is on users and applications, protecting in-flight data as it travels across the network is a critical component of a holistic security strategy.

The expansion in the volume of sensitive information being stored and transmitted by many organisations shows no sign of abating, whilst the Internet and cloud computing present new challenges. This has led to new risks, whilst data breaches – both accidental and malicious – have grown in frequency, severity and business impact. Security breaches impact network availability, which results in disruption to normal business activity and significant business cost. A loss of customers affects revenues directly and reputational damage can seriously affect the customer retention and growth prospects of a business.

Physically securing networks can be extremely challenging, and even if a rack or room can be secured, data itself must traverse disparate systems and locations. In Europe, the General Data Protection Regulation (GDPR) came into effect in May 2018, requiring all companies that process personal data to comply with its provisions or face stiff penalties in the event of a data breach. And in the US, 47 states now have laws requiring notification of data breaches involving personal information. 29 states have laws that explicitly require entities to destroy, dispose, or make personal information unreadable/ undecipherable. As global regulators increasingly address the pressing need for information security, businesses need to adopt a coherent and holistic strategy across their technology infrastructure.

Recommended content for you

Colt collaborates with Microsoft to launch Microsoft Azure ExpressRoute Metro in Madrid, enhancing resilient connectivity with Azure

Colt Technology Services (Colt), the global digital infrastructure company, today announced it has collaborated with Microsoft on the launch of Microsoft Azure ExpressRoute Metro service in Madrid. This step marks a key advancement in cloud ...
Read More

The Journey to Quantum Safe Networking

Protecting your vital information as it traverses across sites, global networks and cloud With the proliferation of supercomputing and quantum processing capabilities around the world, businesses, governments and defence organisations are racing to evolve their ...
Read More

How to deliver secure, scalable and resilient private connectivity over wireless broadband

David Allen, Innovation Manager, Colt For businesses building secure and agile global digital infrastructure, resilience and security are top considerations. To provide primary and backup connectivity, at Colt we’re exploring several options, including the recently ...
Read More
A Colt-branded electric car, in front of a Colt data centre

Ready for anything: How zero trust & SASE can tackle security and performance even during volatile times

Enterprises have responded to increasing global uncertainty by embracing new technologies and new ways of working – but these have exposed them to fresh security vulnerabilities. Securing legacy networks is difficult and compromises agility, performance ...
Read More

Colt, Honeywell and Nokia join forces to trial space-based quantum-safe cryptography

Tech collaboration will explore ways to protect encrypted data from quantum risk using Low Earth Orbit satellites   Colt Technology Services (Colt), the global digital infrastructure company, Honeywell and Nokia today announced a collaboration to ...
Read More
Futuristic design of a cloud network - computing

Cloud, security and the CIO: Navigating complexity with confidence

CIOs are under pressure from all sides. In 2025, they’re expected to drive digital transformation, enable AI adoption and harness the full potential of cloud. All while keeping the business secure, compliant and in control ...
Read More