Enterprise Encryption for Linux

Enterprise Encryption for Linux

Linux has built in encryption for several years now, yet enterprises still struggle with encryption on Linux laptops.  Why is that? To answer this question, let’s first review the disk encryption capabilities that are built into Linux:

Requirements of Security Independence in a Virtualized World

As we evolve more and more to complete self-contained services like the mainstream Cloud services of Microsoft, Amazon, IBM and Google, I often express concerns about the Cyber aspects being coupled.  Enterprises and users are, if they haven’t already, getting more and more comfortable with giving up their physical/virtual servers, applications and storage but are not, and should not, be comfortable giving up control of their sensitive data.  The shared responsibility models of Cloud Services Providers (CSPs) delineates between the physical aspects (network, disks, memory, etc.) and the responsibility of what resides in the storage and computer.

IT Decision Makers have their Head in the “Clouds”

Years ago, tech experts predicted that a new wave of technology would hit the scene and completely rework the way we, well, work. Cloud computing was viewed as the future of the enterprise – at the time, this mysterious yet highly intriguing concept promised to dramatically increased efficiencies that would enable companies to reduce costs and increase business flexibility.

Keeping your Data Safe in the World of Cloud

We live in a world where cloud storage is becoming a part of our everyday life. We use it at home, at work, even on the go. People are able to share files, pictures, and videos within a few clicks of a button and we can access this information from anywhere, as long as there is internet access.

Progress in Cloud Storage Policy; But Still A Long Way To Go

Employees no longer need to shrug their shoulders and feign ignorance when asked by their IT teams if they’ve heard of DropBox, out of fear that access to such convenient cloud applications would be blocked. The results of a survey commissioned by WinMagic show that IT teams are now not only aware of the rampant popularity of so-called file-sync-and-share solutions like DropBox—they are moving to support their use.