Can a key management solution prevent hacks?

The company I’m working in wants me to evaluate if we need a key management solution or not. I understand the concept of what encryption is and what key provisioning and management is, but will say a person hacks one of the user and then impersonates him will he not get access to all the keys since he is authenticated? Maybe my understanding is a bit flawed can someone help me with it?

Touch here for the full post on Network Security Noblemen tumblr

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s