Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Encryption Blog
Showing posts tagged with Perspectives
Showing posts in English
Doug McLean | 10 May 2010 | 0 comments

In the wake of the announcement last month that PGP Corporation has agreed to be acquired by Symantec, there have been a number of articles questioning what this acquisition means for PGP's "open source" policy.

For clarification, PGP Corporation is not and never has been an open source software provider. The term "Open Source" is correctly applied to companies that provide their product source code under the terms of a license that permit the licensee to use, alter, and redistribute the code. The complete requirements to qualify as an open source vendor are more numerous and complicated than I can cover here, but Wikipedia has a very concisely written summary.

Since PGP Corporation was founded eight years ago, we have made our source...

Andrew Klein | 28 Apr 2010 | 0 comments

Andrew Klein - Senior Product Marketing Manager

According to the folks at Privacy Rights Clearinghouse, since 2005 there have been over a thousand data breaches leading to over 320 million compromised records in the United States alone.  These records contained personal, financial and corporate information – none of which was encrypted.

The term “record” might imply a database record, but a majority of the breached records were not stored in a database, but instead were stored in “files” such as spreadsheets, documents and log files.  These files were stored on laptops, desktops, CDs and USB drives, which were stolen, lost or compromised. Some were files transferred in-the-clear over unprotected networks.  There were also breaches which occurred when personal financial information was posted on a web site, Social Security Account Numbers were...

Brian Tokuyoshi | 26 Apr 2010 | 0 comments

PGP recently held a webcast on email data protection to cover considerations about email protection along with information about the latest product release.

We didn’t have time to address all of the questions during the webcast, but I wanted to circle back and provide answers to the remaining questions from the Q&A.

Q: Does PGP have a client available?

A: Yes, PGP Desktop Email is a client-based approach towards email encryption. It provides end-to-end email encryption ensuring that information says protected all the way from the sender to the recipient, no matter what networks or systems it traverses.

Q: Can the PGP platform handle different encryption policies between internal and external email?

A: Yes, the policy engine in PGP...

Andrew Klein | 09 Apr 2010 | 1 comment

Andrew Klein - Senior Product Marketing Manager

Last week, we held a webcast on File Protection.  Here’s a link to the replay [registration required].  There were many great questions, so I took a few minutes to summarize the questions and post the answers.

Q:   Does PGP® NetShare do anything special to protect files against unauthorized file deletion, especially for client machines that do not have the PGP® NetShare client software installed?

A:    PGP® NetShare is concerned with protecting the contents of a file.  It does not protect users from deleting a file they have permission to delete.

Q:   What offering is there for Open Documents Formats on non-Windows platforms?

A:    PGP® NetShare is a...

Tim_Matthews | 31 Mar 2010 | 1 comment

At the recent RSA Conference in San Francisco, I had the pleasure of moderating a panel on the topic of data breaches and how to handle them.  Along with Larry Ponemon, Founder and Chairman of the Ponemon Institute, and Jerry Archer, SVP and CSO at Sallie Mae, was David Shettler from the Open Security Foundation (OSF), publishers of DataLossDB.

Post-panel, as we were walking back through Moscone, David answered a question I had been wondering about: When was the first reported data breach?  Turns out that it happened over a century ago, in 1896, where the dispensary records for the Southern California Hospital for the Insane went missing, and were thought to be stolen.  So protection of...

Shilpi Dey | 30 Mar 2010 | 0 comments

Shilpi Dey - Product Marketing Manager

PGP Universal Server 3.0 Administrator's Guide Last week, we held a webcast on the PGP Endpoint Data Protection 10/3.  Here's a link to the replay [registration required].  I ran out of time to answer all of the questions, but there were so many good ones so I decided to write a post to answer them.

Q:  Does PGP Whole Disk Encryption work on Windows 7? Can PGP Whole Disk Encryption integrate with Active Directory for a single password for PGP and the workstation?  When a user changes their AD password would this change their PGP passphrase as well?

A: Yes, PGP Whole Disk Encryption supports Microsoft® Windows7. For a detailed list of technical specifications, please visit...

Tim_Matthews | 23 Mar 2010 | 0 comments

This past Tuesday, we held a webcast on the new Massachusetts Data Protection Law, a.k.a. 201 CMR 17.  Here's a link to the replay [reg. required].  I ran out of time to answer all of the questions, but there were so many good ones so I decided it was worth writing a post to answer them.

Q: If you use a workgroup version of PGP Whole Disk Encryption can you still get reports on compliance or do you need the Universal Server to prove compliance?

A: Yes, PGP Whole Disk Encryption Workgroup Edition does provide basic reporting that you can use to demonstrate compliance.

Q: What is the impact of computer speed when the entire disk in encrypted?

A: We generally see negligible impact on performance once the initial encryption has taken place.

Q:  How does encrypting the BES server affect data on the hand held devices?

A: PGP Support...

Tim_Matthews | 22 Mar 2010 | 0 comments

Last week we shipped one of the most significant releases in PGP Corporation's short history - PGP 10/3.  The feature payload - which covers file protection, endpoint data protection, and email protection - was designed to help companies deal with the competing tensions of IT consumerization and increasing compliance.  There's a lot in the release, but if I had to net out four key features, here they are:

1) Support for Ubuntu and Red Hat Linux, giving increased coverage for laptops and netbooks

2) PGP Key Management Server 3.0, allowing key and policy management for 3rd party hardware and software...

Tim_Matthews | 27 Jan 2010 | 0 comments

There's no shortage of words written about Cloud computing.  Even the topic of security and the Cloud yields over 28 million results on Google (13 million on Bing for those keeping score).  Given how important a topic securing Cloud computing is, how is one to cut through the clutter?  To help out, here are five of my favorite resources on Cloud Security: 1) Cloud Security Alliance "Security Guidance for Critical Areas of Focus in Cloud Computing"

A comprehensive look at the most important areas of security in the Cloud, written by an esteemed group of security practitioners.

2) Jericho Forum "Cloud Cube Model"

A nice paper that "provides a framework for exploring in more detail the nature of different cloud formations and the...

Bryan Gillson | 18 Jan 2010 | 0 comments

Bryan Gillson - Director, Business Development

At Lotusphere® 2010 today, Kevin Cavanaugh – Lotus Software’s Vice President of Messaging and Collaboration – announced a new addition to the IBM® Lotus® Protector product line created in partnership with PGP Corporation: Lotus Protector for Mail Encryption.

Lotus and PGP Corporation designed Lotus Protector for Mail Encryption to seamlessly extend Lotus Notes integrated email encryption to a wide variety of different recipient types. By leveraging gateway email technology from PGP Universal™ Server and the proxy technology from PGP Desktop Email, Lotus Notes users with Protector for Mail Encryption can send a single email that gets secured regardless of the recipients’ location and encryption technology – whether they’re internal or external; secure messages with Notes, OpenPGP, or S/MIME; or use no encryption technology at all.