Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Encryption Blog
Showing posts tagged with full disk encryption
Showing posts in English
Kelvin_Kwan | 20 Dec 2012 | 4 comments

Folks, the holidays are almost once again upon us.  I sit here today trying to clear off my deliverables before I go on vacation.  But you know what? The year simply would not be complete without having to respond to yet another claim of a 3rd party tool being able to decrypt/access a system encrypted by PGP Whole Disk Encryption.

So Here We Go Again…
This morning, I was made aware of a claim made by ElcomSoft that their product could decrypt PGP containers (as well as other Full Disk Encryption competitors).  After reading through their blog and discussing my thoughts with the Symantec Encryption Engineering team, we have come to the conclusion that this claim is false!  There’s truly nothing to see here. 

The Weakness is NOT the Crypto Containers
I would...

Kelvin_Kwan | 20 Jul 2011 | 14 comments

 

Now before I begin “The Chicken or the Egg” portion of the blog, I want to address an issue that many people are asking or wondering.  “Why must I first decrypt before upgrading to Lion?”  Well there are many reasons.  However, one of the biggest reasons is that in Lion, Apple has added Recovery Partition Support.  This Recovery Partition allows you to perform repairs and recovery to your Mac without having to find the DVD that came with your Mac.  This is important, because whenever your system is encrypted, it is NOT advisable to create, resize, or move partitions.  This is regardless if you’re running OS X, Windows, or Linux.  Bad things (e.g.  Data integrity issues) tend to happen when encrypted and you do partition modifications.  So,...

Tim_Matthews | 05 Jun 2010 | 0 comments

We are pleased to announce that PGP® Whole Disk Encryption successfully achieved Common Criteria Evaluation Assurance Level 4+ (EAL4+) certification.

Level 4 is the highest possible level that is mutually recognized by all countries participating in the Common Criteria certification (the plus denotes augmentation of ALC_FLR.1 Flaw Remediation).

PGP Corporation is one of the only vendors to have an integrated whole disk encryption and management server solution that is Common Criteria certified. PGP® Whole Disk Encryption is also the first disk encryption product to be awarded validation against Common Criteria Evaluation Scheme CC v3.1/CEM v3.1. 

PGP® Whole Disk Encryption provides comprehensive, full disk encryption, enabling quick, cost-...

Andrew Klein | 19 May 2010 | 0 comments

Andrew Klein – Senior Product Marketing Manager

Thanks to everyone who attended the “A day in the life of a file” web cast, recently.  If you missed the web cast, here’s a link to the replay [registration required].  As always, there were many great questions covering a wide range of topics.  The questions and answers are summarized below.

Q:   Does PGP® Mobile support Android and iPhone devices?  If not, when?

A: PGP Mobile is available for Windows Mobile devices. We do receive a number of requests to add support for new devices based on Google Android and Apple iPhone platforms, and we are currently evaluating how support for those devices may fit on our roadmap.

Q:   What about the...

Shilpi Dey | 30 Mar 2010 | 0 comments

Shilpi Dey - Product Marketing Manager

PGP Universal Server 3.0 Administrator's Guide Last week, we held a webcast on the PGP Endpoint Data Protection 10/3.  Here's a link to the replay [registration required].  I ran out of time to answer all of the questions, but there were so many good ones so I decided to write a post to answer them.

Q:  Does PGP Whole Disk Encryption work on Windows 7? Can PGP Whole Disk Encryption integrate with Active Directory for a single password for PGP and the workstation?  When a user changes their AD password would this change their PGP passphrase as well?

A: Yes, PGP Whole Disk Encryption supports Microsoft® Windows7. For a detailed list of technical specifications, please visit...

Tim_Matthews | 22 Mar 2010 | 0 comments

Last week we shipped one of the most significant releases in PGP Corporation's short history - PGP 10/3.  The feature payload - which covers file protection, endpoint data protection, and email protection - was designed to help companies deal with the competing tensions of IT consumerization and increasing compliance.  There's a lot in the release, but if I had to net out four key features, here they are:

1) Support for Ubuntu and Red Hat Linux, giving increased coverage for laptops and netbooks

2) PGP Key Management Server 3.0, allowing key and policy management for 3rd party hardware and software...

John Dasher | 10 Mar 2009 | 2 comments

John Dasher - Director of Product Marketing

dasherhead4

One of the more common queries I hear when talking with both customers and the press involves how I manage my computer/data security while traveling. People seem increasingly nervous about this.

There are a variety of best practices that are specific to your operating system platform (which I’ll cover in a future post), there are a number of import safeguards you can take regardless of your specific computing environment. While I personally find this specific solution a bit of a pain in actual practice, I would be remiss if I didn’t point out that the safest approach you can take is to simply not travel with sensitive data. You can’t lose or have stolen what you haven’t brought with you. And...

Brian Tokuyoshi | 03 Mar 2009 | 0 comments

Brian Tokuyoshi - Product Marketing Manager

As the Academy Awards wrap up, I’m reminded of the film Amadeus, which won the Oscar for Best Picture in 1985. The eponymous film is a dramatization about the life of Wolfgang Amadeus Mozart. In a famous scene, Emperor Joseph II, offering his opinion on Mozart’s new symphony, comments that,  “There are simply too many notes”, without providing any deeper insight into which particular sequence trouble him.

Enterprises today are facing a related situation, except the issue should be called “too many encryption keys” as well as its closely related issue called “too many encryption products”. Let’s take a common example. Growing concerns about data breach notification laws lead ACME company to deploy a disk encryption product. Over time new requirements emerge, and ACME realizes that they need to...