Video Screencast Help
Encryption Blog
Showing posts in English
Brian Tokuyoshi | 09 Dec 2010 | 0 comments

Part of the role that Symantec takes within the security community is to work together with research groups to identify and understand the trends that shape the market. As part of this effort, Symantec is continuing the work started between PGP Corporation and Ponemon Institute to examine the usage of encryption and how it has been evolving over the years.

Ponemon Institute recently completed the “2010 US Enterprise Encryption Trends Report”, published November 2010.  This report surveyed 964 US I.T. workers in various job functions and asked about their insights into their usage of encryption technology in order to protect information assets.

One of the most interesting insights that emerged from this report is that the reason for making the decision to deploy encryption has undergone a shift. In the past, the primary driver has always been in response to a data breach. In the 2010 report, the...

Tim_Matthews | 15 Nov 2010 | 1 comment

For customers experiencing this issue, refer to the entry below from Symantec's In Defense of Data blog:

We don’t often post about product compatibility problems on In Defense of Data blog, but we want to make sure customers are able to access this important information.

Symantec is aware of an issue with Mac OS X 10.6.5 and PGP Whole Disk Encryption 10.0.x. At this time, we recommend that customers using PGP Whole Disk Encryption do not upgrade to Mac OS X 10.6.5.

Read more

Bryan Gillson | 09 Sep 2010 | 4 comments

Bryan Gillson - Senior Director Product Management

Update: As of September 9, 2010, source code downloads of PGP software are again available.

Encryption has always been about trust. Questions about who you trust and who you distrust, are critical to determining whether (and how) to encrypt your data. Of course, trust-related questions go beyond just specific threats and extend directly to the selection of an encryption vendor.

This is why, since its founding, PGP Corporation has made its source code publicly available for cryptographic review. We feel that the ability for the public to study our source code and personally confirm the quality, validity, and security of our cryptographic implementations has been a key reason for the trust placed in PGP Corporation and our products. This belief has been reinforced by many customers across the spectrum: corporate, individual, educational...

Brian Tokuyoshi | 15 Jun 2010 | 0 comments

Brian Tokuyoshi - Senior Product Marketing Manager

I recently attended the 2010 IEEE Key Management Summit, an event that brought together the leading industry pundits talking about the topic of key management. I had a number of interesting discussions with vendors, researchers and customers throughout the conference. In this blog, I’ll summarize some of the things that I saw and offer up a couple of opinions of my own.

The IEEE Key Management Summit was held the first week of May at North Shore Lake Tahoe, Nevada. This event attracts a technical audience, with heavy participation from the leadership of the standards group such as OASIS KMIP, IEEE 1619.3, and IETF KeyProv.

This is the second such conference, the first of which was held in back in 2008. That inaugural event had a number of healthy and loud discussions, where there were clearly differences in philosophies between the...

Brian Tokuyoshi | 14 Jun 2010 | 4 comments

Brian Tokuyoshi - Senior Product Marketing Manager

Putting together a good data protection strategy shouldn’t depend on whether or not your security vendor  chooses to support it. However, based on the adoption of the Apple Macintosh in the enterprise, a lot of IT organizations are getting caught off guard. They’re finding that the vendor they chose to protect their Windows data doesn’t offer any solutions to address Mac OS X users, thus creating a gap in their data protection strategy for an important and growing segment of their user population.

The rise in the use of Mac OS X in business is attributable to a number of factors, including grass roots adoption by individual users, growing consumerization corporate IT, and the acquisition of new companies that have an existing Mac installed base. It’s not practical to just leave these...

Tim_Matthews | 05 Jun 2010 | 0 comments

We are pleased to announce that PGP® Whole Disk Encryption successfully achieved Common Criteria Evaluation Assurance Level 4+ (EAL4+) certification.

Level 4 is the highest possible level that is mutually recognized by all countries participating in the Common Criteria certification (the plus denotes augmentation of ALC_FLR.1 Flaw Remediation).

PGP Corporation is one of the only vendors to have an integrated whole disk encryption and management server solution that is Common Criteria certified. PGP® Whole Disk Encryption is also the first disk encryption product to be awarded validation against Common Criteria Evaluation Scheme CC v3.1/CEM v3.1. 

PGP® Whole Disk Encryption provides comprehensive, full disk encryption, enabling quick, cost-...

Brian Tokuyoshi | 27 May 2010 | 0 comments

PGP recently held a webcast on key management, where there were several questions that we didn’t have enough time to answer during the broadcast. In this blog entry, you’ll find the answers to those questions.

We didn’t have time to answer all the questions during the webcast, but I wanted to circle back and provide you with a detailed answer.

Q: Do you need both PGP Universal Server and PGP Key Management Server?  Or does PGP Key Management Server replace PGP Universal Server?

A: PGP Key Management Server is a new product based on some of the components of PGP Universal Server.  PGP Universal Server is for the management and administration of keys used with PGP applications. A company would use PGP Key Management...

Brian Tokuyoshi | 24 May 2010 | 0 comments

PGP NetShare provides transparent encryption for files in designated folders.  Transparent encryption means that the user doesn’t have to do anything to protect the file other than unlock their private key when they first log into Windows. There’s no right-clicking files to bring up the context menu, and no archive passwords to remember. I simply double click on files that I want to work on, and it’s automatically decrypted.  When I save a file, it’s automatically encrypted. I can still copy & paste the files in the same manner that I normally follow, without any changes to my work process.

Typically, an organization uses PGP NetShare for collaboration, enabling an organization to set up workgroups with network shared folders that remain safe from snooping even if accessed by a curious system administrator or copied to a backup tape.

However, what’s not so widely known is that there are lots of uses for PGP NetShare even...

Brendon Wilson | 21 May 2010 | 0 comments

Brendon J. Wilson – Director of Marketing, PGP TrustCenter

Last week, we held a webcast on Simplifying SSL Certificate Management.  Here’s a link to the replay [registration required]. As this was the first web cast for the new PGP TrustCenter Division of PGP Corporation, there were a wide variety of enthusiastic many, in fact, that we couldn't answer them all in the time available. I took a few minutes to summarize the questions and post the answers below.

Q: You mentioned that PGP TrustCenter’s data center is accredited by a number of security standards – which ones? Do you have SAS-70?

A: PGP TrustCenter’s data center is accredited according to ETSI (a European equivalent to WebTrust), Safe BIO-...

Andrew Klein | 19 May 2010 | 0 comments

Andrew Klein – Senior Product Marketing Manager

Thanks to everyone who attended the “A day in the life of a file” web cast, recently.  If you missed the web cast, here’s a link to the replay [registration required].  As always, there were many great questions covering a wide range of topics.  The questions and answers are summarized below.

Q:   Does PGP® Mobile support Android and iPhone devices?  If not, when?

A: PGP Mobile is available for Windows Mobile devices. We do receive a number of requests to add support for new devices based on Google Android and Apple iPhone platforms, and we are currently evaluating how support for those devices may fit on our roadmap.

Q:   What about the...