Encryption

External Article

Column-Level Encryption in SQL Server

  • Article

Beginning with SQL Server 2005, column-level encryption and decryption capabilities were made available within the database, providing a solution for situations where one-off types of data need to be secured beyond your existing authorization, authentication or firewall settings. This article provides an overview and example of securing a column using native SQL Server cryptography functions.

2011-02-18

4,894 reads

External Article

SQL Server Encryption Symmetric vs. Asymmetric Keys

  • Article

I need to encrypt my data within SQL Server and I plan on using the built-in encryption functionality in SQL Server 2005 and 2008. However, I'm looking at symmetric and asymmetric key algorithms and while I see information saying to use symmetric keys, I don't understand why. What's the difference between the two and why is a symmetric key algorithm preferred over the asymmetric key ones?

2009-12-02

3,414 reads

Blogs

SQL Server is Slow, part 3 of 4

By

In parts 1 and 2 of this series, we’ve gathered info and done the...

AI Model Size, Parameters and Download

By

At SQL Saturday Boston 2025, I gave a presentation on local LLMs and there...

Expanding Your DBA Horizons: Installing PostgreSQL in a Home Lab

By

Are you diversifying your DBA skillset? My recent job search made one thing clear:...

Read the latest Blogs

Forums

caught off guard by some greek lettering in a warehouse feed

By stan

Hi we run 2019 standard.   Our warehouse's ssis based etl is klunky but so...

Unlocking High-Concurrency Inserts in SQL Server with OPTIMIZE_FOR_SEQUENTIAL_KEY

By Chandan Shukla

Comments posted to this topic are about the item Unlocking High-Concurrency Inserts in SQL...

Vector Datatype

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Vector Datatype

Visit the forum

Question of the Day

Vector Datatype

The new Vector datatype in SQL Server 2025 is a binary type that has a few parameters. What parameters are required?

See possible answers