Disk and file encryption tools
Encrypting data at rest and in motion, whether at the file level or the disk level, can be a valuable tactic in the fight against hackers. Get advice on how to secure your organization's data disk and file encryption tools and technology.
New & Notable
Disk and file encryption tools News
-
July 23, 2020
23
Jul'20
Microsoft unveils new DLP, 'Double Key Encryption' offerings
Microsoft revealed new security products and features this week, including an Endpoint Data Loss Prevention product as well as "Double Key Encryption" for Microsoft 365.
-
June 11, 2020
11
Jun'20
Italian company implicated in GuLoader malware attacks
While analyzing the network dropper GuLoader, researchers found an almost identical commercial software tool called CloudEye offered by a legitimate-looking Italian company.
-
March 06, 2020
06
Mar'20
Intel CSME flaw deemed 'unfixable' by Positive Technologies
Positive Technologies researchers discovered a previously disclosed vulnerability in the Intel Converged Security and Management Engine is worse than originally reported.
-
March 07, 2019
07
Mar'19
Cryptography techniques must keep pace with threats, experts warn
Cryptographers at RSAC 2019 discussed personal data protection laws and challenges, future threats and the pressure for tech companies to work with law enforcement on decryption.
Disk and file encryption tools Get Started
Bring yourself up to speed with our introductory content
-
Format-preserving encryption use cases, benefits, alternative
With format-preserving encryption, a ciphertext's format is the same as its plaintext's. Read up on the benefits of this cryptography method, NIST FPE methods, vendors and more. Continue Reading
-
How to send secure email attachments
Sending sensitive information in attachments is inherently unsafe, and the main way to secure them -- encryption -- can be implemented inconsistently, negating security benefits. Continue Reading
-
How to use a public key and private key in digital signatures
Ensuring authenticity of online communications is critical to conduct business. Learn how to use a public key and private key in digital signatures to manage electronic documents. Continue Reading
Evaluate Disk and file encryption tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Weighing double key encryption challenges, payoffs
Microsoft's new double key encryption offering brings data security and compliance benefits. Are they worth the implementation challenges? Continue Reading
-
Data security guide: Everything you need to know
This data security guide digs into data protection and privacy compliance, explaining how to construct a proactive security strategy strengthened by best practices. Continue Reading
-
A closer look at new and updated Microsoft security features
Microsoft augments the native protection features in its newer Windows Server releases with cloud-based security products to reduce the likelihood of a successful breach attempt. Continue Reading
Manage Disk and file encryption tools
Learn to apply best practices and optimize your operations.
-
Tackle multi-cloud key management challenges with KMaaS
Cloud providers' tools for secrets management are not equipped to solve unique multi-cloud key management challenges. Learn how key management-as-a-service tools can fill the gaps. Continue Reading
-
Building security, privacy and trust in IoT deployments
The T in IoT doesn't stand for trust, but it's a critical component of any IoT deployment. Follow the AEIOU vowel framework for an actionable blueprint of building trust in IoT. Continue Reading
-
How to secure data at rest, in use and in motion
With internal and external cyberthreats on the rise, check out these tips to best protect and secure data at rest and in motion. Continue Reading
Problem Solve Disk and file encryption tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
How to prevent network eavesdropping attacks
One of the biggest challenges of network eavesdropping attacks is they are difficult to detect. Read about prevention measures to help keep your network safe from snoopers and sniffers. Continue Reading
-
How does Microsoft BitLocker secure local, cloud resources?
The BitLocker encryption technology continues to evolve from its roots as a Windows Vista feature to protect resources both in the local data center and in the Azure cloud platform. Continue Reading
-
How to use and manage BitLocker encryption
Built into business versions of the Windows OS, Microsoft BitLocker encryption is an integral enterprise encryption tool. Read on to learn how BitLocker works and how to manage it. Continue Reading