How encryption can add value to your business
The use of encryption is no longer optional for many organizations. Certain new regulations demand its use while others provide a safe harbor so that organizations do not have to notify individuals in the event of a security breach—provided data was encrypted. Even those organizations that are not subject to such regulation should consider the use of encryption as best practice for protecting data on portable devices.
Security breaches are everyday news
Data is increasingly being lost through theft and carelessness. As mobile devices proliferate and become ever smaller, more powerful and functional, it is all too easy for such devices to go missing. This puts large amounts of potentially sensitive information at risk. Encryption, and specifically full-disk encryption, is coming into wider use as a security best practice
Software-based full-disk encryption and newer self-encrypting hard drives provide the highest level of protection by ensuring that no data can be retrieved by third parties from devices that have been lost. Encryption adds value to an organization by enabling the secure sharing of information
Data security technologies should not restrict access to useful information. Rather, the use of encryption allows authenticated users to more easily and securely share information and enables organizations to expand their mobile working practices in a secure manner. Organizations can use encryption to considerably reduce risk across their organization
By ensuring that encryption is always on, is transparent to the user and cannot be bypassed, the chance for human error is reduced considerably. For the best benefits, organizations should look for a product that integrates with all existing technologies in use, including security technologies such as threat management systems, all operating systems and all devices. Encryption can aid organizations in achieving their regulatory compliance objectives
Through the use of full-disk encryption, organizations can ensure that no information, such as file names remain in the clear, so saving the expense and possible embarrassment of having to notify individuals in case of the loss of personally identifiable information. The use of self-encrypting hard drives and trusted hardware devices that can be safely erased adds a further layer of protection and can reduce the cost of securely re purposing old devices for new uses. Productivity gains will be seen through ease of deployment, management and use
Provided the right solution is implemented, through centralized management capabilities, encryption software, cryptographic keys and security policies can be easily deployed and managed, freeing up IT resources for other tasks. Users will also benefit through robust self-service capabilities for provisioning encryption keys and resetting forgotten passwords.
Conclusions
The complexities and cost of using encryption systems have been reduced considerably through the provision of centralized management, making the use of encryption viable for organizations of all sizes. Whether centrally managed on-premise or through a hosted service provider, full-disk encryption systems can shield organizations from data loss and help them achieve their security objectives.
FOR MORE READ FULL ARTICLE
The use of encryption is no longer optional for many organizations. Certain new regulations demand its use while others provide a safe harbor so that organizations do not have to notify individuals in the event of a security breach—provided data was encrypted. Even those organizations that are not subject to such regulation should consider the use of encryption as best practice for protecting data on portable devices.
Security breaches are everyday news
Data is increasingly being lost through theft and carelessness. As mobile devices proliferate and become ever smaller, more powerful and functional, it is all too easy for such devices to go missing. This puts large amounts of potentially sensitive information at risk. Encryption, and specifically full-disk encryption, is coming into wider use as a security best practice
Software-based full-disk encryption and newer self-encrypting hard drives provide the highest level of protection by ensuring that no data can be retrieved by third parties from devices that have been lost. Encryption adds value to an organization by enabling the secure sharing of information
Data security technologies should not restrict access to useful information. Rather, the use of encryption allows authenticated users to more easily and securely share information and enables organizations to expand their mobile working practices in a secure manner. Organizations can use encryption to considerably reduce risk across their organization
By ensuring that encryption is always on, is transparent to the user and cannot be bypassed, the chance for human error is reduced considerably. For the best benefits, organizations should look for a product that integrates with all existing technologies in use, including security technologies such as threat management systems, all operating systems and all devices. Encryption can aid organizations in achieving their regulatory compliance objectives
Through the use of full-disk encryption, organizations can ensure that no information, such as file names remain in the clear, so saving the expense and possible embarrassment of having to notify individuals in case of the loss of personally identifiable information. The use of self-encrypting hard drives and trusted hardware devices that can be safely erased adds a further layer of protection and can reduce the cost of securely re purposing old devices for new uses. Productivity gains will be seen through ease of deployment, management and use
Provided the right solution is implemented, through centralized management capabilities, encryption software, cryptographic keys and security policies can be easily deployed and managed, freeing up IT resources for other tasks. Users will also benefit through robust self-service capabilities for provisioning encryption keys and resetting forgotten passwords.
Conclusions
The complexities and cost of using encryption systems have been reduced considerably through the provision of centralized management, making the use of encryption viable for organizations of all sizes. Whether centrally managed on-premise or through a hosted service provider, full-disk encryption systems can shield organizations from data loss and help them achieve their security objectives.
FOR MORE READ FULL ARTICLE