SearchSecurity.com

Curveball: Endpoint encryption strategies

This podcast is a portion of SearchSecurity.com's Integration of Networking and Security School lesson, Back to basics: Endpoint security on a budget. Visit the lesson and school pages for additional learning resources, or visit our Security School Course Catalog to begin other lessons.


When a laptop turns up stolen, it's reassuring to know that the contents of the device were encrypted, transforming a potentially disastrous data breach into a simple case of missing hardware. In this podcast we look at the issues surrounding the use of encryption to secure data stored on endpoint computers.

Specifically, we address

Play now:

You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now.
Download for later:

Curveball: Endpoint encryption strategies
• Internet Explorer: Right Click > Save Target As
• Firefox: Right Click > Save Link As

About the speaker:
Mike Chapple, CISSP, is an information security specialist with the University of Notre Dame.

10 Aug 2009

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement