Video Screencast Help
Encryption Blog
Showing posts tagged with Symantec Endpoint Encryption - Device Control
Showing posts in English
Tim_Matthews | 23 Sep 2009 | 0 comments

Tim Matthews - Senior Director Product Marketing

Encryption and brand management make for an unlikely pairing. While both skilled disciplines, it's hard to imagine regular meetings between the math-mad elliptic curve tinkerer and Armani-clad glad hander archetypes. But the linkage between the two has only grown stronger the more of our lives we live online.

For those not familiar with how valuable a brand can be, there’s no better place to start than the Best Global Brands report by...

Brian Tokuyoshi | 22 Sep 2009 | 0 comments

Brian Tokuyoshi - Product Marketing Manager

The PCI Data Security Standard brought the issue of data encryption to light for many organizations. It established a baseline for security practices that highlighted some of the things that best-of-class security organizations already knew, such as specifying the types of data that must be protected and how to avoid risky practices that could expose such information to unauthorized access. It was necessary because the card processing industry is extensive and there needed to be guidelines to bring all the participating companies up to spec.

Yet it still appears to be clear that there are lingering misunderstandings about what it sought to achieve. From the viewpoint of the industry, it is easier to understand its purpose, for it gives the credit card industry better assurances to its customers that all the companies handling personal information have met a minimum set of security standards. From the...

Tim_Matthews | 15 Sep 2009 | 0 comments

Tim Matthews -Senior Director Product Marketing

Unless you've been hiding under a rock, you've no doubt heard a thing or two about cloud computing.  While an exciting shift for the entire industry, cloud computing is currently in "high hype mode," where separating hope from reality can be a challenge.  That's why PGP Corporatation signed on early to sponsor the excellent work of the Cloud Security Alliance (CSA).

The CSA is a non-profit organization formed to promote the use of best practices for providing security assurance within cloud computing.  The group's first work product, "Security Guidance for Critical Areas of Focus in Cloud Computing," is required reading for any security professional.   Now the focus is on understanding how organizations are viewing security in the...

Doug McLean | 30 Aug 2009 | 0 comments

Phil Dunkelberger - President & CEO

With news of data breaches becoming a regular event and increasing in frequency, they hardly count as "news" any longer. In fact, breach disclosures have become such a regular part of our daily routine that it's getting harder to see the "forest for the trees." As nearly all states now have breach disclosure laws, we're now living in an era where fewer breaches go unreported, even if some of them get reported late. The question now is not whether data is at risk, but what new threats are emerging and how do we best address them. I'm pleased to announce that PGP Corporation has partnered with the Open Security Foundation...

Tim_Matthews | 27 Aug 2009 | 20 comments

Like everyone in the Macintosh user community, we're excited by Apple's early Friday delivery of Snow Leopard (Mac OS X 10.6). Unfortunately, like many applications at the moment, the currently shipping versions of PGP Desktop products (v 9.10) are not supported on Snow Leopard. This includes PGP Desktop Professional, PGP Desktop Home, PGP Desktop Email and PGP Whole Disk Encryption (a comprehensive list of Mac OS X applications and their status on Snow Leopard is available on the MacInTouch site).

While we are working diligently to complete the Snow Leopard compatible versions of the PGP Desktop products, we do not recommend you use the currently shipping versions on any system that has been upgraded to Snow Leopard. Please note that users wanting to migrate to Snow Leopard immediately must first decrypt all of their PGP WDE encrypted drives and uninstall...

Doug McLean | 24 Aug 2009 | 0 comments

Doug McLean - Blogmeister

Readers of this blog know that I've been following the case against Albert Gonzalez, the alleged mastermind behind the TJX breach. Last Monday came the shocking news that the Justice Department has concluded that Gonzalez also led the teams that breached both Heartland Payment Systems and Hannaford Bros. Supermarkets. Think about that for a minute, we've now traced three of the largest data breaches in history to the "vision" and leadership of a single man. Gonzalez is currently incarcerated in Brooklyn, NY where he's awaiting trial for allegedly perpetrating the comparatively modest breach of Dave & Busters Restaurants.

We've also learned that Gonzalez and his colleagues did not attack companies at random, but selected specific Fortune 500...

Shilpi Dey | 19 Aug 2009 | 0 comments

Shilpi Dey - Product Marketing Manager

Recently, three HSBC firms were fined several millions of dollars for "failing to adequately protect customers' confidential details from being lost or stolen". Sensitive customer data in the order of 180,000 records was sent to third parties on CDs and simply got lost in the mail. While no customer reported a loss from the failure, the Financial Services Authority (FSA) did not take too kindly to what they termed as the firms being "careless" and fined them to the tune of $5.3M.  As the HSBC firms tally their multi-million dollar fines during what’s described as one of the worst economic climates in the world's history,  the old adage comes to mind: penny-wise and pound foolish.

For the record, I'm not trying to pick on HSBC here, these kinds of breaches have now been reported by nearly...

Doug McLean | 18 Aug 2009 | 0 comments

Doug McLean - Blogmeister

The Washington Post broke an interesting story just before the Independence Day holiday about the issues the National Security Agency (NSA) has encountered in deploying their latest cyberdefense system. The Post requires a log-in to view the story, but the Wall Street Journal also covered the topic in more depth and it’s open to all to read, which I strongly recommend to anyone that cares about cybersecurity.

The basic story runs as follows. The Bush administration chartered the NSA with developing a comprehensive solution to both detect and block cyberattacks aimed at federal networks. The system, named Einstein, was originally deployed in 2002, though the functionality of the system was limited to intrusion detection, no countermeasure...

Brian Tokuyoshi | 18 Aug 2009 | 1 comment

Brian Tokuyoshi - Product Marketing Manager

I recently met with a customer who was concerned about his data retention policies. He’s responsible for a number of servers and data on mainframes, and he fully supports the idea of doing encryption to keep it safe.

This particular customer understands the  value of using open standards for encryption. He said the following to me. “We’re encrypting data and backing it up. So let me ask you what you think, you backup the data, you backup the key, but do you backup the application?” That’s a problem that never occurred to me, because PGP Encryption Platform applications use the OpenPGP standard. Files encrypted with PGP software can be decrypted with other software that supports the...

Robin Witty | 17 Aug 2009 | 0 comments

Robin Witty-Senior Product Marketing Manager

Are your company's emails really secure? Do you know for sure when most email sent over the Internet is in clear text and can be read by anyone with simple tools and know-how. Similar to the old party line telephone systems where neighbors could listen in on your phone calls, unauthorized parties can obtain confidential information from unencrypted corporate emails including valuable intellectual property or third party data that may require protection regulated by law.

If you think email breaches can’t happen to your company, consider a couple of high profile email breaches. Sarah Palin’s personal emails were posted to the web and her password was changed by a hacker. A...