Access "Symantec acquisitions cement encryption-as-a-feature"
This article is part of the June 2010 issue of Finding affordable encryption options for laptop data security
When Baylor University set out to evaluate whole disk encryption software in 2004, the technology was somewhat separate and isolated from other security tools. The school was deploying encryption on its staff laptops to protect sensitive student data in the wake of new data breach notification rules that were to take effect in Texas in 2005. Baylor chose PGP Universal Server, which edged out several other vendors for its centralized management console and ease of use, says Jon Allen, information security officer at the Waco, Texas-based university. With more than 1,300 devices now encrypted, PGP's recovery system has been crucial in letting IT easily access and reset locked computers if a staff member forgets their passphrase. Today however, Allen sees the technology in a different light. No matter if its whole disk encryption, email encryption or transaction encryption, security vendors are integrating the technology as a feature in larger security suites. So when Symantec announced its intention to acquire PGP and GuardianEdge, arguably the most widely ... Access >>>
Premium Content for Free.
Cloud computing risks and how to manage them
by Tim Mather
Cloud computing alters enterprise risk. Here's what you need to know in order to safely navigate the cloud.
Use full disk or file/folder encryption for laptop data security
by Dave Shackleford
Learn about the options for protecting laptop data, including full disk encryption and file/folder encryption, and their associated deployment and management challenges.
- Cloud computing risks and how to manage them by Tim Mather
Symantec acquisitions cement encryption-as-a-feature
Symantec acquisitions of PGP and Guardian Edge future ensures that encryption is becoming less of a standalone security tool.
Demystifying governance, risk and compliance
by David Schneier
GRC aims to bring together disparate compliance efforts in the enterprise, but the concept has been stymied by a lack of clarity. Developing a GRC program requires three key steps.
- Symantec acquisitions cement encryption-as-a-feature
Don't keep quiet after a data security breach
by Kim Getgen and Kimberly Kiefer Peretti
Organizations who stay silent after a data security breach end up paying a higher price and helping cybercriminals.
Weighing the risk of hiring hackers
Bruce Schneier and Marcus Ranum debate the risks associated with hiring hackers.
Information security spending shouldn't be driven by compliance
If you're spending more to protect custodial data because of compliance than you are to protect company secrets, you're missing the big picture.
- Don't keep quiet after a data security breach by Kim Getgen and Kimberly Kiefer Peretti
More Premium Content Accessible For Free
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...
The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...