Curveball: Endpoint encryption strategies

SearchSecurity.com Security School

This podcast is a portion of SearchSecurity.com's Integration of Networking and Security School lesson, Back to basics: Endpoint security on a budget. Visit the lesson and school pages for additional learning resources, or visit our Security School Course Catalog to begin other lessons.

When a laptop turns up stolen, it's reassuring to know that the contents of the device were encrypted, transforming a potentially disastrous data breach into a simple case of missing hardware. In this podcast we look at the issues surrounding the use of encryption to secure data stored on endpoint computers.

Specifically, we address

  • Basics of endpoint encryption: what are we trying to accomplish?
  • Commonly used encryption technologies
  • Legal protections afforded to encryption users
  • Key management and escrow
  • Extending encryption to smartphones, PDAs and other non-computer mobile devices

Play now:

You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now.
Download for later:

Curveball: Endpoint encryption strategies
• Internet Explorer: Right Click > Save Target As
• Firefox: Right Click > Save Link As

About the speaker:
Mike Chapple, CISSP, is an information security specialist with the University of Notre Dame.

This was first published in August 2009

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: