Video Screencast Help
Scheduled Maintenance: Symantec Connect is scheduled to be down Saturday, April 19 from 10am to 2pm Pacific Standard Time (GMT: 5pm to 9pm) for server migration and upgrades.
Please accept our apologies in advance for any inconvenience this might cause.

Encryption Blog

Showing posts tagged with PGP Command Line
Showing posts in English
Kelvin_Kwan | 17 Sep 2013 | 13 comments

Symantec Encryption Releases 3.3.1/10.3.1
In this release, we support Windows 8, increase our Linux platform support, and as always improve security whenever appropriate.  Here’s a summary of what’s new:

  • Support Windows 8 Pro and Enterprise editions 32- and 64-bit versions, for Symantec Drive Encryption both BIOS and UEFI systems (only 64-bit for UEFI), Desktop Email Encryption, File Share Encryption, and Encryption Desktop utilities (PGP Virtual Disk, ZIP, and Shredder)
  • Desktop Email Encryption compatibility with Microsoft Outlook 2013, both 32- and 64-bit versions
  • Desktop Email Encryption compatibility with Microsoft Office 365 Cloud Server when using a supported email client
  • Mac OS X 10.8.3 and 10.8.4 support for Symantec Drive Encryption and Symantec Desktop Email Encryption
  • Symantec Drive Encryption support for Linux.  This now includes Red Hat Enterprise 5.9, 6.3, and 6.4 (32- and...
Kelvin_Kwan | 10 Jun 2013 | 1 comment

 

You Have Choices
On July 1, 2013, Symantec will officially announce that all customers with active maintenance for Symantec Endpoint Encryption Full Disk Edition (SEE FDE) will automatically have their licenses migrated to our new FlexChoice Disk Encryption license.

Essentially, we are replacing the current SKU for SEE FDE with a new SKU.  This new SKU entitles customers with the ability to choose which disk encryption product you wish to use. You can simply continue to use your SEE FDE product, or you can use the Symantec Drive Encryption, Powered by PGP Technology (SDE) product.  Or, you can use a combination of the two.  

Superseded
We are NOT discontinuing/end-of-life’ing SEE FDE. I cannot emphasize this enough.  The SEE FDE product will continue to be supported and available for purchase.  We simply are offering more flexibility to our customers to choose whichever product they wish...

Kelvin_Kwan | 28 Jan 2013 | 0 comments

In the past, it was fairly easy to keep corporate data protected by keeping it within an established perimeter—protected by established access controls and passwords.  That model has been blown apart as iPhone, iPad and other smartphones and tablets have taken over. Add to that the accessibility and usability of file sharing services like Dropbox and you can see why this transformation has information security managers concerned. These are not trends that organizations can deal with by saying “no.”  They urgently need solutions to help secure confidential data and limit access.

Today, we’re pleased to announce that Symantec’s new encryption solutions, powered by PGP Technology, are now shipping. With this Symantec Encryption release, Symantec leverages our encryption portfolio to ensure cloud data remains safe while keeping it accessible, and to protect confidential email for mobile.

Here’s a look at what’s new....

Kelvin_Kwan | 20 Dec 2012 | 4 comments

Folks, the holidays are almost once again upon us.  I sit here today trying to clear off my deliverables before I go on vacation.  But you know what? The year simply would not be complete without having to respond to yet another claim of a 3rd party tool being able to decrypt/access a system encrypted by PGP Whole Disk Encryption.

So Here We Go Again…
This morning, I was made aware of a claim made by ElcomSoft that their product could decrypt PGP containers (as well as other Full Disk Encryption competitors).  After reading through their blog and discussing my thoughts with the Symantec Encryption Engineering team, we have come to the conclusion that this claim is false!  There’s truly nothing to see here. 

The Weakness is NOT the Crypto Containers
I would...

Kelvin_Kwan | 15 Jun 2012 | 71 comments

The newest version of OS X, 10.8 - Mountain Lion is scheduled to be released sometime in July of 2012 by Apple.

Based on past experiences, we do NOT recommend users currently encrypted with PGP Whole Disk Encryption or SEE Full Disk Encryption for Macs upgrade to OS X 10.8 when made available by Apple.

Symantec is actively testing PGP WDE and SEE FDE against the 10.8 developer builds from Apple. We will continue testing against all developer builds from Apple and also against the official release from Apple.

As a reminder, you should not upgrade to 10.8 if you wish to continue to use WDE.  If you must upgraded to 10.8, then please decrypt your disk prior to installing 10.8.  Once on 10.8, please do not re-encrypt at this point in time.  

Please check back to this blog for updates as they become available.

 

...

Kelvin_Kwan | 30 May 2012 | 1 comment

A few recent headlines (Google translated link) have suggested that PGP encryption can be broken. My first reaction was with a sigh: “Not this again!” Such claims have been made before, and so far not a single one has proven true. Thus far, that seems to be the case here.

Breaking “PGP Crypto” Means Breaking AES
First, remember that PGP products do not use a custom encryption algorithm. They are based on well-studied, standard algorithms such as RSA and AES, at bit lengths that are regarded as best practices for strong...

Kelvin_Kwan | 29 May 2012 | 1 comment

Passware recently blogged about the ability to "instantly decrypt PGP Whole Disk Encryption" with their latest release of Passware Kit 11.7.

Based on deeper investigation from Symantec engineering, it has been concluded that a properly configured PC is not vulnerable to this Passware claim.

A Whole Disk Encrypted machine is not vulnerable to an offline attack. If an attacker was to steal a machine in an offline state (powered off or hibernating state) the first place they would look for the key information is in the hibernation file or crash dumps. The problem, however, is that this is only possible if the PC was not encrypted at the disk block level. You cannot get to the hibernation file or the crash dumps since this information is in an encrypted state, and you would need to authenticate to the disk first to get to those files....

Brian Tokuyoshi | 07 Mar 2011 | 7 comments

As a PGP customer, you may have seen the changes that we’ve been making as we transition customer support from the PGP environment to Symantec. Here’s what you need to do to download the latest PGP software.

 

For PGP software orders purchased prior to February 4, 2011:

 

Step 1: PGP Products are now downloaded via the Symantec Licensing Portal. Click the following link http://lems.pgp.com , and you will be automatically redirected to the Symantec Licensing Portal.

Step 2: Enter the email address which was used to purchase your PGP product and then click SEND MY ACCOUNT INFO.  An email is sent with your Symantec Licensing Portal credentials.

Step 3: After receiving your account login credentials, click the following link and enter your email and password....

Brian Tokuyoshi | 19 Jan 2011 | 0 comments

Blog Entry – Prioritizing Key Management When Considering the Cloud

One of the trends that I’ve noted when talking with customers is the desire to get cryptographic keys under better central management in anticipation of the cloud. At face value, one might wonder what the connection might be. Why build a key management plan before rolling out a cloud computing strategy?

It turns out that there are several good reasons:

  1. There’s no better time to build out a strategy for managing keys. Once an IT organization evaluates where their data exists and where the encryption lives, the more important better management tools become. It makes a lot of sense to get the existing key management issues under control as a precursory step before moving applications and data to the cloud.
  2. There’s a lot of concerns about cloud security models, especially with respect to who holds the keys. One of encryption’s central use cases is being...