Portal Home |  IS News Menu |  Portal Menu |  ISB Menu |  Main Content
White Paper: Don't Rely on File-Based Encryption Only
06 Apr 01:01

Enterprise organizations are at risk of losing millions of dollars from the theft of a single personal computer. Enterprise data protection authority GuardianEdge has developed a White Paper to help organizations better understand how full disk encryption software can help them manage and mitigate the risks associated with computer theft and data exposure.

Enterprise organizations are at risk of losing millions of dollars from the theft of a single personal computer. Information that was stored exclusively on mainframes and other core systems is now widely available on laptop and desktop PCs. Recent changes in the legislative landscape have dramatically increased the risk of weak security by imposing harsh penalties on organizations that fail to implement strong data security measures.

In response to the unprecedented need for stronger PC security, GuardianEdge has developed a White Paper to help organizations better understand how full disk encryption software can help them manage and mitigate the risks associated with computer theft and data exposure. The document, entitled Managing Enterprise Risk With Full Disk Encryption, discusses the impact of computer and identity theft on information security, providing several examples that illustrate just how damaging a single incident can be.

The White Paper also explains how full disk encryption can help organizations secure corporate PCs and prevent costly data exposures, highlighting the reasons why full disk encryption is more secure and most cost-effective than mere file-based encryption. Software that only encrypts selected files, folders or file-types leaves system and application files unprotected. Unfortunately, system and application files have become popular vectors for attack for cyber-criminals. System files are particularly vulnerable to offline or power-off attacks even unused disk space can be exploited to gain access to local and network resources. File-based encryption products are only effective against power-on attacks that occur after the operating system has loaded, leaving local and network resources vulnerable and -- even worse -- promoting a false sense of security.

The paper is available from the GuardianEdge Web site.

Related links: (Open in a new window.)
External link www.guardianedge.com/white_papers/managing_enterprise_risk.html

View Printable View printable version (opens in new window)
Back Back