What’s the right choice?

We’re a huge proponent that Full Disk Encryption (FDE) is the cornerstone of any data security solution and should be the foundation for which all solutions should be built on. But more and more, in a world where customers are dealing with strict budgets, compromises need to be made and customers are looking at alternative solutions.

Generally speaking we offer many forms of data protection with SecureDoc, FDE, port control, removable media encryption (RME), SED management or FileVault 2 management. However, we’re seeing an increasing amount of customer being more surgical in the way they manage their device security.

High risk products like laptops and other devices that regularly leave the office tend to get the most attention and are typically the most at risk. As a result, these systems tend to get the ‘whole hog’ when it comes to device security, FDE, RME, Port Control etc. They’re locked down tight to avoid potential risk.

But what about devices that don’t leave the office; the workstations, desktops, thin clients and other devices that are somewhat safer within the confines of doors with swipe card access and other security measures?

This is where we see customers trying to be more economical (if budgets dictate) in how they secure data on these devices. Given a device isn’t leaving the premises, there is less risk to that device being lost or stolen, so the concern for these devices is ensuring that any data that leaves the device remains encrypted. The solution? Removable Media Encryption (RME) or Removable Media Container Encryption (RMCE). Policies enforcing this ensure data that is removed from the system must be encrypted when removed from the system.

Alternately, some customers don’t ever want data leaving a device that must remain on premise. In this instance, port control and policies restricting writing to external media can be employed to prevent this. Locking down optical drives and USB ports from being able to write information more or less removes the risk associated with ‘data slurping.’

We have to be flexible in our approach, considerate of budgets and generally open and understanding of their requirements and how we can best address them.

Sometimes, one size doesn’t fit all.

Previous Post
Have a good rest on Civic Day, Canada!
Next Post
Securing the Cloud

Related Posts

Constant Improvement

Late last year we introduced SecureDoc 6.1 and introduced a whole host of new features including MDM, FileVault 2 management capabilities, a Web-based console and more. As with any new release there are kinks that can be worked out and…

Keeping up with Healthcare Security

We’ve been busy lately on the news front and doing our part to contribute to security discussions going on in the Healthcare space. One of the hottest topics we’ve been addressing recently is the affect bring your own device (BYOD)…

The Need for Speed

Is software encryption on a notebook with a Solid State Drive (SSD) a non-starter due to performance concerns? This is a good question and I have heard it asked by some pretty smart people recently. (more…)

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu