Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Encryption Blog
Showing posts tagged with File Share Encryption (File Encryption)
Showing posts in English
Tim_Matthews | 31 Mar 2010 | 1 comment

At the recent RSA Conference in San Francisco, I had the pleasure of moderating a panel on the topic of data breaches and how to handle them.  Along with Larry Ponemon, Founder and Chairman of the Ponemon Institute, and Jerry Archer, SVP and CSO at Sallie Mae, was David Shettler from the Open Security Foundation (OSF), publishers of DataLossDB.

Post-panel, as we were walking back through Moscone, David answered a question I had been wondering about: When was the first reported data breach?  Turns out that it happened over a century ago, in 1896, where the dispensary records for the Southern California Hospital for the Insane went missing, and were thought to be stolen.  So protection of...

Shilpi Dey | 30 Mar 2010 | 0 comments

Shilpi Dey - Product Marketing Manager

PGP Universal Server 3.0 Administrator's Guide Last week, we held a webcast on the PGP Endpoint Data Protection 10/3.  Here's a link to the replay [registration required].  I ran out of time to answer all of the questions, but there were so many good ones so I decided to write a post to answer them.

Q:  Does PGP Whole Disk Encryption work on Windows 7? Can PGP Whole Disk Encryption integrate with Active Directory for a single password for PGP and the workstation?  When a user changes their AD password would this change their PGP passphrase as well?

A: Yes, PGP Whole Disk Encryption supports Microsoft® Windows7. For a detailed list of technical specifications, please visit...

Tim_Matthews | 23 Mar 2010 | 0 comments

This past Tuesday, we held a webcast on the new Massachusetts Data Protection Law, a.k.a. 201 CMR 17.  Here's a link to the replay [reg. required].  I ran out of time to answer all of the questions, but there were so many good ones so I decided it was worth writing a post to answer them.

Q: If you use a workgroup version of PGP Whole Disk Encryption can you still get reports on compliance or do you need the Universal Server to prove compliance?

A: Yes, PGP Whole Disk Encryption Workgroup Edition does provide basic reporting that you can use to demonstrate compliance.

Q: What is the impact of computer speed when the entire disk in encrypted?

A: We generally see negligible impact on performance once the initial encryption has taken place.

Q:  How does encrypting the BES server affect data on the hand held devices?

A: PGP Support...

Tim_Matthews | 22 Mar 2010 | 0 comments

Last week we shipped one of the most significant releases in PGP Corporation's short history - PGP 10/3.  The feature payload - which covers file protection, endpoint data protection, and email protection - was designed to help companies deal with the competing tensions of IT consumerization and increasing compliance.  There's a lot in the release, but if I had to net out four key features, here they are:

1) Support for Ubuntu and Red Hat Linux, giving increased coverage for laptops and netbooks

2) PGP Key Management Server 3.0, allowing key and policy management for 3rd party hardware and software...

Tim_Matthews | 27 Jan 2010 | 0 comments

There's no shortage of words written about Cloud computing.  Even the topic of security and the Cloud yields over 28 million results on Google (13 million on Bing for those keeping score).  Given how important a topic securing Cloud computing is, how is one to cut through the clutter?  To help out, here are five of my favorite resources on Cloud Security: 1) Cloud Security Alliance "Security Guidance for Critical Areas of Focus in Cloud Computing"

A comprehensive look at the most important areas of security in the Cloud, written by an esteemed group of security practitioners.

2) Jericho Forum "Cloud Cube Model"

A nice paper that "provides a framework for exploring in more detail the nature of different cloud formations and the...

Brian Tokuyoshi | 20 Jan 2010 | 0 comments

Google Gmail has become a phenomenally popular service, with a user base estimated in excess of 150 million.  In addition to its popularity with consumers, Gmail has been gaining ground as a service for commercial users as well. One notable instance is the City of Los Angeles, which is spending $7.25M to move 30,000 email users to the Gmail platform. As more organizations start to take a cloud-based approach to their IT computing services, the need for enterprise-managed security starts to become apparent.

Last week, Google announced that its Gmail service was the target of an attack and that certain users may have had their email accounts compromised. In recent days...

Bryan Gillson | 18 Jan 2010 | 0 comments

Bryan Gillson - Director, Business Development

At Lotusphere® 2010 today, Kevin Cavanaugh – Lotus Software’s Vice President of Messaging and Collaboration – announced a new addition to the IBM® Lotus® Protector product line created in partnership with PGP Corporation: Lotus Protector for Mail Encryption.

Lotus and PGP Corporation designed Lotus Protector for Mail Encryption to seamlessly extend Lotus Notes integrated email encryption to a wide variety of different recipient types. By leveraging gateway email technology from PGP Universal™ Server and the proxy technology from PGP Desktop Email, Lotus Notes users with Protector for Mail Encryption can send a single email that gets secured regardless of the recipients’ location and encryption technology – whether they’re internal or external; secure messages with Notes, OpenPGP, or S/MIME; or use no encryption technology at all.


Tim_Matthews | 15 Jan 2010 | 4 comments

I'm very pleased to announced that PGP Desktop 10.0 is now shipping.

All customers with current subscription licenses or maintenance will receive this upgrade free of charge. It is also available for purchase by new customers on the PGP webstore. PGP Desktop 10.0 brings all of the features you've come to expect to Mac OS 10.6 (Snow Leopard) including support for Boot Camp, Windows 7 (32 & 64 bit), and for the first time Whole Disk Encryption support to Linux (Red Hat and Ubuntu).

What else is new?  In summary:

  • Encrypt/Sign button for Microsoft Outlook
  • Faster encryption and decryption
  • Installation localization for French and Spanish
  • Safeguards against boot disk corruption
  • Support for Boot Camp

This also marks the termination of the PGP Desktop 10.0 beta program. I'd like to thank the hundreds of you who contributed to this program and helping us make PGP Desktop 10.0 the best release...

Brian Tokuyoshi | 12 Jan 2010 | 0 comments

“Open Sesame”

The phrase comes from the English translation of Ali Baba and the Forty Thieves. In that story, Ali Baba discovers that the thieves kept their treasure in a cave that’s protected by a magical door. In order to open the door, one must only utter the phrase “Open Sesame”.

Ali Baba uses this information in order to steal treasure from the cave, and thus begins the story as Ali Baba and the tribe of thieves plan revenge upon one another. Although the Forty Thieves didn’t realize it at the time, the real problem they faced was that their magic door had poor proof of identity. The security for the door relied on a shared secret, and thus freely let in unauthorized people who learned of the magic words.

It would have been far better and more secure if the door didn’t rely on shared secrets at all, and rather used a secret specific to each person as well as require proof that the user had the rights to use said...

Doug McLean | 08 Jan 2010 | 0 comments

One good way to tell if a topic has become mainstream is to monitor USA Today. So I wasn't terribly surprised when I found the lead in the paper's Money section on New Years Day to be focused on the latest trend in cybercrime. It seems that many cybercriminals, frustrated with the countermeasures put in place by larger banks and enterprises are now targeting smaller businesses that have adopted online banking as a way to save both money and and time.

As we all know cybercrooks like to target the weakest link in any system that might yield cash or cash equivalents. In this case, the miscreants have determined that the some of the systems banks use to support smaller businesses have material weaknesses that can be exploited. Specifically, the Automated Clearing House (ACH) systems and wire transfer systems have not kept pace with...