What’s the right choice?

We’re a huge proponent that Full Disk Encryption (FDE) is the cornerstone of any data security solution and should be the foundation for which all solutions should be built on. But more and more, in a world where customers are dealing with strict budgets, compromises need to be made and customers are looking at alternative solutions.

Generally speaking we offer many forms of data protection with SecureDoc, FDE, port control, removable media encryption (RME), SED management or FileVault 2 management. However, we’re seeing an increasing amount of customer being more surgical in the way they manage their device security.

High risk products like laptops and other devices that regularly leave the office tend to get the most attention and are typically the most at risk. As a result, these systems tend to get the ‘whole hog’ when it comes to device security, FDE, RME, Port Control etc. They’re locked down tight to avoid potential risk.

But what about devices that don’t leave the office; the workstations, desktops, thin clients and other devices that are somewhat safer within the confines of doors with swipe card access and other security measures?

This is where we see customers trying to be more economical (if budgets dictate) in how they secure data on these devices. Given a device isn’t leaving the premises, there is less risk to that device being lost or stolen, so the concern for these devices is ensuring that any data that leaves the device remains encrypted. The solution? Removable Media Encryption (RME) or Removable Media Container Encryption (RMCE). Policies enforcing this ensure data that is removed from the system must be encrypted when removed from the system.

Alternately, some customers don’t ever want data leaving a device that must remain on premise. In this instance, port control and policies restricting writing to external media can be employed to prevent this. Locking down optical drives and USB ports from being able to write information more or less removes the risk associated with ‘data slurping.’

We have to be flexible in our approach, considerate of budgets and generally open and understanding of their requirements and how we can best address them.

Sometimes, one size doesn’t fit all.

Previous Post
Have a good rest on Civic Day, Canada!
Next Post
Securing the Cloud

Related Posts

An innovative approach – CIOSynergy

Last week I had the opportunity to attend the CIOSynergy event in Toronto at the Trump Hotel & Tower. It was an interesting day of interacting with key IT decision makers within various organizations and learning about some of the…
Read more

Windows 8 is here! Now what?

As someone that’s worked in IT for the better part of 14 years, I’ve seen my fair share of product launches. When it comes to operating systems, it’s always a cyclical engine; big flurry of attention at launch followed by…

What is going on in Healthcare?

I’ve talked about data breaches due to a lost laptop before. They’re common, painful and usually generate horrible publicity. It continues to be alarming how many of these devices that are lost continue to be unencrypted. Looking around lately, there’s…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu