What’s the right choice?

We’re a huge proponent that Full Disk Encryption (FDE) is the cornerstone of any data security solution and should be the foundation for which all solutions should be built on. But more and more, in a world where customers are dealing with strict budgets, compromises need to be made and customers are looking at alternative solutions.

Generally speaking we offer many forms of data protection with SecureDoc, FDE, port control, removable media encryption (RME), SED management or FileVault 2 management. However, we’re seeing an increasing amount of customer being more surgical in the way they manage their device security.

High risk products like laptops and other devices that regularly leave the office tend to get the most attention and are typically the most at risk. As a result, these systems tend to get the ‘whole hog’ when it comes to device security, FDE, RME, Port Control etc. They’re locked down tight to avoid potential risk.

But what about devices that don’t leave the office; the workstations, desktops, thin clients and other devices that are somewhat safer within the confines of doors with swipe card access and other security measures?

This is where we see customers trying to be more economical (if budgets dictate) in how they secure data on these devices. Given a device isn’t leaving the premises, there is less risk to that device being lost or stolen, so the concern for these devices is ensuring that any data that leaves the device remains encrypted. The solution? Removable Media Encryption (RME) or Removable Media Container Encryption (RMCE). Policies enforcing this ensure data that is removed from the system must be encrypted when removed from the system.

Alternately, some customers don’t ever want data leaving a device that must remain on premise. In this instance, port control and policies restricting writing to external media can be employed to prevent this. Locking down optical drives and USB ports from being able to write information more or less removes the risk associated with ‘data slurping.’

We have to be flexible in our approach, considerate of budgets and generally open and understanding of their requirements and how we can best address them.

Sometimes, one size doesn’t fit all.

Previous Post
Have a good rest on Civic Day, Canada!
Next Post
Securing the Cloud

Related Posts

Hidden Benefits of Encryption for Legal Services

Lately we have noticed a growing interest for encryption and data security in the legal services industry. Legal services face a similar challenge as other verticals with the need to protect corporate assets being shared through multiple devices and portals.…
Read more

Oh, so you stop hackers and stuff?

What I’d like touch on today with this post is a common misconception about data encryption and security. When I tell people who I work for and what we do, many people assume what we do is protect people from…
Read more

Revisiting the TPM

TPMs have been shipping for nearly 8 years now.  WinMagic was an early adopter and supported TPM version 1.1 for full disk encryption before most.  We expanded our support to the more main stream version 1.2 TPMs when they started…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu