Critical company information and communications are protected by keys and certificates, and ineffective management of keys and certificates is the single biggest reason why companies experience data security breaches. And this applies not just too symmetric keys, but to all cryptographic keys, including private keys, asymmetric keys SSH keys, and certificates.
Symmetric key technology is still widely used today for the protection of data at rest, and SSH and SSL are the de-factor standards for data in motion. In the case of symmetric key encryption there are no de-facto standards with the result that most storage vendors such as IBM, HP, EMC, etc., provide proprietary solutions.
The link for this article located at SecurityPark is no longer available.