Data encryption efforts ramp up in face of growing security threats

The greatest challenge when deploying a system is key management. How are keys distributed and protected?