Both symmetric and asymmetric encryption methods have their places in securing enterprise data. Compare and contrast where each of these is used in real life applications. Use at least one global example in identifying the differences of applications.