Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Encryption Blog
Showing posts tagged with File Share Encryption (File Encryption)
Showing posts in English
Brian Tokuyoshi | 24 May 2010 | 0 comments

PGP NetShare provides transparent encryption for files in designated folders.  Transparent encryption means that the user doesn’t have to do anything to protect the file other than unlock their private key when they first log into Windows. There’s no right-clicking files to bring up the context menu, and no archive passwords to remember. I simply double click on files that I want to work on, and it’s automatically decrypted.  When I save a file, it’s automatically encrypted. I can still copy & paste the files in the same manner that I normally follow, without any changes to my work process.

Typically, an organization uses PGP NetShare for collaboration, enabling an organization to set up workgroups with network shared folders that remain safe from snooping even if accessed by a curious system administrator or copied to a backup tape.

However, what’s not so widely known is that there are lots of uses for PGP NetShare even...

Brendon Wilson | 21 May 2010 | 0 comments

Brendon J. Wilson – Director of Marketing, PGP TrustCenter

Last week, we held a webcast on Simplifying SSL Certificate Management.  Here’s a link to the replay [registration required]. As this was the first web cast for the new PGP TrustCenter Division of PGP Corporation, there were a wide variety of enthusiastic many, in fact, that we couldn't answer them all in the time available. I took a few minutes to summarize the questions and post the answers below.

Q: You mentioned that PGP TrustCenter’s data center is accredited by a number of security standards – which ones? Do you have SAS-70?

A: PGP TrustCenter’s data center is accredited according to ETSI (a European equivalent to WebTrust), Safe BIO-...

Andrew Klein | 19 May 2010 | 0 comments

Andrew Klein – Senior Product Marketing Manager

Thanks to everyone who attended the “A day in the life of a file” web cast, recently.  If you missed the web cast, here’s a link to the replay [registration required].  As always, there were many great questions covering a wide range of topics.  The questions and answers are summarized below.

Q:   Does PGP® Mobile support Android and iPhone devices?  If not, when?

A: PGP Mobile is available for Windows Mobile devices. We do receive a number of requests to add support for new devices based on Google Android and Apple iPhone platforms, and we are currently evaluating how support for those devices may fit on our roadmap.

Q:   What about the...

Brendon Wilson | 18 May 2010 | 0 comments

Brendon J. Wilson – Director of Marketing, PGP TrustCenter Division

Last year, online shoppers spent over $150B in online transactions in the US alone – it wasn’t long ago that the lack of transaction security would have made these revenues inconceivable. Today, the security provided by the Secure Sockets Layer (SSL) protocol not only enables organizations to collect payments on the web, but also to securely communicate sensitive business information to partners, and to deliver internal network resources to remote workers.

As the global recession continues, SSL provides organizations a way to thrive despite the financial downturn by enabling businesses to expand market reach, to streamline costs, to tap far-flung resources, and to explore new revenue opportunities. Tapping these opportunities requires SSL certificates from...

Doug McLean | 10 May 2010 | 0 comments

In the wake of the announcement last month that PGP Corporation has agreed to be acquired by Symantec, there have been a number of articles questioning what this acquisition means for PGP's "open source" policy.

For clarification, PGP Corporation is not and never has been an open source software provider. The term "Open Source" is correctly applied to companies that provide their product source code under the terms of a license that permit the licensee to use, alter, and redistribute the code. The complete requirements to qualify as an open source vendor are more numerous and complicated than I can cover here, but Wikipedia has a very concisely written summary.

Since PGP Corporation was founded eight years ago, we have made our source...

Andrew Klein | 28 Apr 2010 | 0 comments

Andrew Klein - Senior Product Marketing Manager

According to the folks at Privacy Rights Clearinghouse, since 2005 there have been over a thousand data breaches leading to over 320 million compromised records in the United States alone.  These records contained personal, financial and corporate information – none of which was encrypted.

The term “record” might imply a database record, but a majority of the breached records were not stored in a database, but instead were stored in “files” such as spreadsheets, documents and log files.  These files were stored on laptops, desktops, CDs and USB drives, which were stolen, lost or compromised. Some were files transferred in-the-clear over unprotected networks.  There were also breaches which occurred when personal financial information was posted on a web site, Social Security Account Numbers were...

Brian Tokuyoshi | 26 Apr 2010 | 0 comments

PGP recently held a webcast on email data protection to cover considerations about email protection along with information about the latest product release.

We didn’t have time to address all of the questions during the webcast, but I wanted to circle back and provide answers to the remaining questions from the Q&A.

Q: Does PGP have a client available?

A: Yes, PGP Desktop Email is a client-based approach towards email encryption. It provides end-to-end email encryption ensuring that information says protected all the way from the sender to the recipient, no matter what networks or systems it traverses.

Q: Can the PGP platform handle different encryption policies between internal and external email?

A: Yes, the policy engine in PGP...

Andrew Klein | 09 Apr 2010 | 1 comment

Andrew Klein - Senior Product Marketing Manager

Last week, we held a webcast on File Protection.  Here’s a link to the replay [registration required].  There were many great questions, so I took a few minutes to summarize the questions and post the answers.

Q:   Does PGP® NetShare do anything special to protect files against unauthorized file deletion, especially for client machines that do not have the PGP® NetShare client software installed?

A:    PGP® NetShare is concerned with protecting the contents of a file.  It does not protect users from deleting a file they have permission to delete.

Q:   What offering is there for Open Documents Formats on non-Windows platforms?

A:    PGP® NetShare is a...

Doug McLean | 05 Apr 2010 | 0 comments

That headline is not my assertion, but the conclusion reached by the Department of Justice itself. More specifically it's the conclusion of a report by the Department's Office of the Inspector General (OIG). The OIG's charter as stated on its website is below.

The Office of the Inspector General (OIG) conducts independent investigations, audits, inspections, and special reviews of United States Department of Justice personnel and programs to detect and deter waste, fraud, abuse, and misconduct, and to promote integrity, economy, efficiency, and effectiveness in Department of Justice operations.

Typically, the OIG's reports review the finances and activities of each of the Department's nine bureaus.  This particular report, however, reviews the entire Department of Justice's activities around identity theft since President Bush...

Doug McLean | 02 Apr 2010 | 3 comments

The Internet Crime Complaint Center published its annual Internet Crime Report earlier this month. The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA). Some of the numbers in the report this year are just stunning.

While the number of complaints of cybercrime filed with IC3 increased 22% in 2009 compared to 2008, the total dollar losses increased a staggering 111% after four years of being relatively flat.

Annual Cybercrime Losses