This podcast is a portion of SearchSecurity.com's Integration of Networking and Security School lesson, Back to basics: Endpoint security on a budget. Visit the lesson and school pages for additional learning resources, or visit our Security School Course Catalog to begin other lessons.
When a laptop turns up stolen, it's reassuring to know that the contents of the device were encrypted, transforming a potentially disastrous data breach into a simple case of missing hardware. In this podcast we look at the issues surrounding the use of encryption to secure data stored on endpoint computers.
Specifically, we address
- Basics of endpoint encryption: what are we trying to accomplish?
- Commonly used encryption technologies
- Legal protections afforded to encryption users
- Key management and escrow
- Extending encryption to smartphones, PDAs and other non-computer mobile devices
You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now.
Download for later:
Curveball: Endpoint encryption strategies
• Internet Explorer: Right Click > Save Target As
• Firefox: Right Click > Save Link As
About the speaker:
Mike Chapple, CISSP, is an information security specialist with the University of Notre Dame.
This was first published in August 2009