Access "Encryption software vendors can expect challenge from hardware front"
This article is part of the July/August 2007 issue of CISO survival guide: 18 of the best security tips
Hard Core Encryption software vendors can expect a challenge from the hardware front. Laptop encryption hasn't exactly taken the business world by storm, but that's starting to change. Performance issues and management headaches notwithstanding, the specter of one of those many lost or stolen laptops triggering the next VA debacle may be enough incentive for companies to take the plunge. Until now, the laptop encryption market has belonged to software vendors, such as SafeBoot, Utimaco Safeware, Credant Technologies, Pointsec Mobile Technologies (recently acquired by Check Point Software Technologies) and PGP, but that's changed with the release of Seagate Technology's Momentus 5400 FDE.2 full disk encryption hard drive. Seagate is the first hard drive manufacturer to release an encrypted drive; Hitachi has said it will also get into this market. Seagate is betting companies will embrace hardware-based encryption because of cost, performance and easier management. It estimates that its hardware encryption will save about $300 per laptop over software ... Access >>>
Premium Content for Free.
Emerging Technologies: How to secure new products
New business initiatives mean new threats.
Protecting Your Brand
Customer confidence is at risk when a breach occurs.
Is perimeter security viable with Swiss cheese networks?
At Your Service: Veracode's SaaS-based application analysis
Metasploit Framework 3.0 Product Review
In this product review, learn everything about the Metasploit Framework 3.0, a penetration testing tool for Linux and Windows platforms.
- Emerging Technologies: How to secure new products
Success requires skills in business, technology and people.
Antivirus: ESET's NOD32 Antivirus 2.7
ESET's NOD32 Antivirus 2.7
Unified Threat Management: Secure Computing's Sidewinder 2150 v7
Secure Computing's Sidewinder 2150 v7
Encryption software vendors can expect challenge from hardware front
Until now, the laptop encryption market has belonged to software vendors. Learn how all that has changed.
Endpoint Security: F-Secure's Client Security 7.0
F-Secure's Client Security 7.0
- Office Politics
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...