Podcast

Curveball: Endpoint encryption strategies

SearchSecurity.com Security School

This podcast is a portion of SearchSecurity.com's Integration of Networking and Security School lesson, Back to basics: Endpoint security on a budget. Visit the lesson and school pages for additional learning resources, or visit our Security School Course Catalog to begin other lessons.


When a laptop turns up stolen, it's reassuring to know that the contents of the device were encrypted, transforming a potentially disastrous data breach into a simple case of missing hardware. In this podcast we look at the issues surrounding the use of encryption to secure data stored on endpoint computers.

Specifically, we address

  • Basics of endpoint encryption: what are we trying to accomplish?
  • Commonly used encryption technologies
  • Legal protections afforded to encryption users
  • Key management and escrow
  • Extending encryption to smartphones, PDAs and other non-computer mobile devices

Play now:

You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now.
Download for later:

Curveball: Endpoint encryption strategies
• Internet Explorer: Right Click > Save Target As
• Firefox: Right Click > Save Link As

About the speaker:
Mike Chapple, CISSP, is an information security specialist with the University of Notre Dame.


This was first published in August 2009