A new company policy requires hardware encryption for certain highly confidential systems. These existing systems do not already have a hardware component that can provide this functionality. What is the easiest way to implement this new policy?
|Threats, Attacks and Vulnerabilities|
|Technologies and Tools|
|Architecture and Design|
|Identity and Access Management|
|Cryptography and PKI|