Enlightening Conversations

Last week I attended an event in Seattle; it was a small, intimate group setting where a number of vendors talked about IT security with key business leaders. It was an interesting day full of discussion around how to secure the enterprise ranging from the cloud to end point devices.

The main thing about this event was all about having discussions with key CISOs and their teams about IT Security. It wasn’t about sales pitches, it was about the dialogue. It was a refreshing change as a presenter and forced me out of my traditional comfort zone to really focus on the conversation not my content.

It was in those discussions that a number of key things really came to light. The one that stands out the most is the definition of hardware-based encryption. As a data encryption vendor, our definition of hardware-based encryption is almost always a reference to things such as Self Encrypting Drives (SEDs). However, that reference was seen as something completely different by the people I was talking to in the room – they were thinking of back-end server appliances such as security gateways etc.  When I asked how many of the organizations in the room used hardware-based encryption solutions a lot of hands went up – which was a huge surprise.

When I clarified what I was talking about and asked how many organizations in the room used SEDs, not a single hand was raised. This was more in line with my expectations but still somewhat surprising at the lack of adoption. There’s still a common misconception around SEDs that they’re expensive and difficult to manage.

In asking about their main concerns with integrating SEDs into their environment, these executives and administrators said the main stumbling block was central management and how creating a mixed environment with SEDs and software encryption would be a nightmare to try and manage. The fact is there are solutions out there that remove this kind of complexity.

Of course its self serving for me to say but it’s true, SecureDoc can seamlessly manage mixed environments without issue. When I pointed out that SecureDoc can intelligently determine if a client has an SED and make the decision to use the hardware based encryption install of installing software encryption a lot of eyebrows were raised.

The ultimate goal of the event was to have good, healthy discussions about IT Security and I think that was accomplished. The fact I had the opportunity to educate organizations about why encryption solutions don’t have to be complicated was a bonus. It’s always fun to educate people and dispel traditional misconceptions about technology.

Previous Post
FDE and Windows 8 – Showing off at RSA
Next Post
Waging the War on Passwords

Related Posts

Pre-Boot Network Authentication

Being an IT administrator can be very challanging, with many responsibilities ranging from making sure every employee has the proper working tools required to do their jobs to keeping corporate data safe. Some of the simplest tasks faced by IT…
Read more

Building Support

We’ve teased about the SecureDoc updates coming next week, but it’s going to be more than just about updates to our software. (more…)
Read more

Come one, come all

Last week we announced the results of the Ponemon Institute study we commissioned and had co-sponsored by leading industry SED partners. We wanted to take this opportunity to remind readers that next week we’ll be reviewing the data via a…
Read more

Exiting out the backdoor

In late December it was revealed that RSA allegedly implemented flawed encryption technology to enable an NSA back door into its tokens. As a result of this, a few key speakers at this year’s RSA 2014 conference are backing out of…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu