Video Screencast Help
Encryption Blog
Showing posts tagged with Key Management Server (Key Management)
Showing posts in English
Brian Tokuyoshi | 07 Mar 2011 | 7 comments

As a PGP customer, you may have seen the changes that we’ve been making as we transition customer support from the PGP environment to Symantec. Here’s what you need to do to download the latest PGP software.

 

For PGP software orders purchased prior to February 4, 2011:

 

Step 1: PGP Products are now downloaded via the Symantec Licensing Portal. Click the following link http://lems.pgp.com , and you will be automatically redirected to the Symantec Licensing Portal.

Step 2: Enter the email address which was used to purchase your PGP product and then click SEND MY ACCOUNT INFO.  An email is sent with your Symantec Licensing Portal credentials.

Step 3: After receiving your account login credentials, click the following link and enter your email and password....

Brian Tokuyoshi | 25 Feb 2011 | 1 comment

In a recent press release, the British Information Commissioner’s Office commented about a recent data loss incident experienced by the Cambridgeshire County Council.  In a roundabout manner, it turns out that an encrypted memory stick triggered a course of events that led to the loss of sensitive personal information.

The council attempted to do the right thing, by providing an encrypted memory stick to its employees, free of charge. However, due to issues with the device, a frustrated employee stopped using the encrypted device provided to him and replaced it with an unapproved, unencrypted one. The unencrypted device contained sensitive information, and unfortunately it was lost, thus resulting in a data loss incident.

This incident brings up an important issue – it’s not enough to have an...

Brian Tokuyoshi | 19 Jan 2011 | 0 comments

Blog Entry – Prioritizing Key Management When Considering the Cloud

One of the trends that I’ve noted when talking with customers is the desire to get cryptographic keys under better central management in anticipation of the cloud. At face value, one might wonder what the connection might be. Why build a key management plan before rolling out a cloud computing strategy?

It turns out that there are several good reasons:

  1. There’s no better time to build out a strategy for managing keys. Once an IT organization evaluates where their data exists and where the encryption lives, the more important better management tools become. It makes a lot of sense to get the existing key management issues under control as a precursory step before moving applications and data to the cloud.
  2. There’s a lot of concerns about cloud security models, especially with respect to who holds the keys. One of encryption’s central use cases is being...
Brian Tokuyoshi | 09 Dec 2010 | 0 comments

Part of the role that Symantec takes within the security community is to work together with research groups to identify and understand the trends that shape the market. As part of this effort, Symantec is continuing the work started between PGP Corporation and Ponemon Institute to examine the usage of encryption and how it has been evolving over the years.

Ponemon Institute recently completed the “2010 US Enterprise Encryption Trends Report”, published November 2010.  This report surveyed 964 US I.T. workers in various job functions and asked about their insights into their usage of encryption technology in order to protect information assets.

One of the most interesting insights that emerged from this report is that the reason for making the decision to deploy encryption has undergone a shift. In the past, the primary driver has always been in response to a data breach. In the 2010 report, the...

Tim_Matthews | 15 Nov 2010 | 1 comment

For customers experiencing this issue, refer to the entry below from Symantec's In Defense of Data blog:

We don’t often post about product compatibility problems on In Defense of Data blog, but we want to make sure customers are able to access this important information.

Symantec is aware of an issue with Mac OS X 10.6.5 and PGP Whole Disk Encryption 10.0.x. At this time, we recommend that customers using PGP Whole Disk Encryption do not upgrade to Mac OS X 10.6.5.

Read more

Bryan Gillson | 09 Sep 2010 | 4 comments

Bryan Gillson - Senior Director Product Management

Update: As of September 9, 2010, source code downloads of PGP software are again available.

Encryption has always been about trust. Questions about who you trust and who you distrust, are critical to determining whether (and how) to encrypt your data. Of course, trust-related questions go beyond just specific threats and extend directly to the selection of an encryption vendor.

This is why, since its founding, PGP Corporation has made its source code publicly available for cryptographic review. We feel that the ability for the public to study our source code and personally confirm the quality, validity, and security of our cryptographic implementations has been a key reason for the trust placed in PGP Corporation and our products. This belief has been reinforced by many customers across the spectrum: corporate, individual, educational...

Brian Tokuyoshi | 15 Jun 2010 | 0 comments

Brian Tokuyoshi - Senior Product Marketing Manager

I recently attended the 2010 IEEE Key Management Summit, an event that brought together the leading industry pundits talking about the topic of key management. I had a number of interesting discussions with vendors, researchers and customers throughout the conference. In this blog, I’ll summarize some of the things that I saw and offer up a couple of opinions of my own.

The IEEE Key Management Summit was held the first week of May at North Shore Lake Tahoe, Nevada. This event attracts a technical audience, with heavy participation from the leadership of the standards group such as OASIS KMIP, IEEE 1619.3, and IETF KeyProv.

This is the second such conference, the first of which was held in back in 2008. That inaugural event had a number of healthy and loud discussions, where there were clearly differences in philosophies between the...

Brian Tokuyoshi | 14 Jun 2010 | 4 comments

Brian Tokuyoshi - Senior Product Marketing Manager

Putting together a good data protection strategy shouldn’t depend on whether or not your security vendor  chooses to support it. However, based on the adoption of the Apple Macintosh in the enterprise, a lot of IT organizations are getting caught off guard. They’re finding that the vendor they chose to protect their Windows data doesn’t offer any solutions to address Mac OS X users, thus creating a gap in their data protection strategy for an important and growing segment of their user population.

The rise in the use of Mac OS X in business is attributable to a number of factors, including grass roots adoption by individual users, growing consumerization corporate IT, and the acquisition of new companies that have an existing Mac installed base. It’s not practical to just leave these...

Tim_Matthews | 05 Jun 2010 | 0 comments

We are pleased to announce that PGP® Whole Disk Encryption successfully achieved Common Criteria Evaluation Assurance Level 4+ (EAL4+) certification.

Level 4 is the highest possible level that is mutually recognized by all countries participating in the Common Criteria certification (the plus denotes augmentation of ALC_FLR.1 Flaw Remediation).

PGP Corporation is one of the only vendors to have an integrated whole disk encryption and management server solution that is Common Criteria certified. PGP® Whole Disk Encryption is also the first disk encryption product to be awarded validation against Common Criteria Evaluation Scheme CC v3.1/CEM v3.1. 

PGP® Whole Disk Encryption provides comprehensive, full disk encryption, enabling quick, cost-...

Brian Tokuyoshi | 27 May 2010 | 0 comments

PGP recently held a webcast on key management, where there were several questions that we didn’t have enough time to answer during the broadcast. In this blog entry, you’ll find the answers to those questions.

We didn’t have time to answer all the questions during the webcast, but I wanted to circle back and provide you with a detailed answer.

Q: Do you need both PGP Universal Server and PGP Key Management Server?  Or does PGP Key Management Server replace PGP Universal Server?

A: PGP Key Management Server is a new product based on some of the components of PGP Universal Server.  PGP Universal Server is for the management and administration of keys used with PGP applications. A company would use PGP Key Management...