Curveball: Endpoint encryption strategies

When a laptop turns up stolen, it's reassuring to know that the contents of the device were encrypted, transforming a potentially disastrous data breach into a simple case of missing hardware. In this podcast we look at the issues surrounding the use of encryption to secure data stored on endpoint computers.

SearchSecurity.com Security School

This podcast is a portion of SearchSecurity.com's Integration of Networking and Security School lesson, Back to basics: Endpoint security on a budget. Visit the lesson and school pages for additional learning resources, or visit our Security School Course Catalog to begin other lessons.


When a laptop turns up stolen, it's reassuring to know that the contents of the device were encrypted, transforming a potentially disastrous data breach into a simple case of missing hardware. In this podcast we look at the issues surrounding the use of encryption to secure data stored on endpoint computers.

Specifically, we address

  • Basics of endpoint encryption: what are we trying to accomplish?
  • Commonly used encryption technologies
  • Legal protections afforded to encryption users
  • Key management and escrow
  • Extending encryption to smartphones, PDAs and other non-computer mobile devices

Play now:

You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now.
Download for later:

Curveball: Endpoint encryption strategies
• Internet Explorer: Right Click > Save Target As
• Firefox: Right Click > Save Link As

About the speaker:
Mike Chapple, CISSP, is an information security specialist with the University of Notre Dame.

This was first published in August 2009

Dig deeper on Disk Encryption and File Encryption

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close