Video Screencast Help
Encryption Blog
Showing posts in English
Brendon Wilson | 18 May 2010 | 0 comments

Brendon J. Wilson – Director of Marketing, PGP TrustCenter Division

Last year, online shoppers spent over $150B in online transactions in the US alone – it wasn’t long ago that the lack of transaction security would have made these revenues inconceivable. Today, the security provided by the Secure Sockets Layer (SSL) protocol not only enables organizations to collect payments on the web, but also to securely communicate sensitive business information to partners, and to deliver internal network resources to remote workers.

As the global recession continues, SSL provides organizations a way to thrive despite the financial downturn by enabling businesses to expand market reach, to streamline costs, to tap far-flung resources, and to explore new revenue opportunities. Tapping these opportunities requires SSL certificates from...

Doug McLean | 10 May 2010 | 0 comments

In the wake of the announcement last month that PGP Corporation has agreed to be acquired by Symantec, there have been a number of articles questioning what this acquisition means for PGP's "open source" policy.

For clarification, PGP Corporation is not and never has been an open source software provider. The term "Open Source" is correctly applied to companies that provide their product source code under the terms of a license that permit the licensee to use, alter, and redistribute the code. The complete requirements to qualify as an open source vendor are more numerous and complicated than I can cover here, but Wikipedia has a very concisely written summary.

Since PGP Corporation was founded eight years ago, we have made our source...

Andrew Klein | 28 Apr 2010 | 0 comments

Andrew Klein - Senior Product Marketing Manager

According to the folks at Privacy Rights Clearinghouse, since 2005 there have been over a thousand data breaches leading to over 320 million compromised records in the United States alone.  These records contained personal, financial and corporate information – none of which was encrypted.

The term “record” might imply a database record, but a majority of the breached records were not stored in a database, but instead were stored in “files” such as spreadsheets, documents and log files.  These files were stored on laptops, desktops, CDs and USB drives, which were stolen, lost or compromised. Some were files transferred in-the-clear over unprotected networks.  There were also breaches which occurred when personal financial information was posted on a web site, Social Security Account Numbers were...

Brian Tokuyoshi | 26 Apr 2010 | 0 comments

PGP recently held a webcast on email data protection to cover considerations about email protection along with information about the latest product release.

We didn’t have time to address all of the questions during the webcast, but I wanted to circle back and provide answers to the remaining questions from the Q&A.

Q: Does PGP have a client available?

A: Yes, PGP Desktop Email is a client-based approach towards email encryption. It provides end-to-end email encryption ensuring that information says protected all the way from the sender to the recipient, no matter what networks or systems it traverses.

Q: Can the PGP platform handle different encryption policies between internal and external email?

A: Yes, the policy engine in PGP...

Andrew Klein | 09 Apr 2010 | 1 comment

Andrew Klein - Senior Product Marketing Manager

Last week, we held a webcast on File Protection.  Here’s a link to the replay [registration required].  There were many great questions, so I took a few minutes to summarize the questions and post the answers.

Q:   Does PGP® NetShare do anything special to protect files against unauthorized file deletion, especially for client machines that do not have the PGP® NetShare client software installed?

A:    PGP® NetShare is concerned with protecting the contents of a file.  It does not protect users from deleting a file they have permission to delete.

Q:   What offering is there for Open Documents Formats on non-Windows platforms?

A:    PGP® NetShare is a...

Doug McLean | 05 Apr 2010 | 0 comments

That headline is not my assertion, but the conclusion reached by the Department of Justice itself. More specifically it's the conclusion of a report by the Department's Office of the Inspector General (OIG). The OIG's charter as stated on its website is below.

The Office of the Inspector General (OIG) conducts independent investigations, audits, inspections, and special reviews of United States Department of Justice personnel and programs to detect and deter waste, fraud, abuse, and misconduct, and to promote integrity, economy, efficiency, and effectiveness in Department of Justice operations.

Typically, the OIG's reports review the finances and activities of each of the Department's nine bureaus.  This particular report, however, reviews the entire Department of Justice's activities around identity theft since President Bush...

Doug McLean | 02 Apr 2010 | 3 comments

The Internet Crime Complaint Center published its annual Internet Crime Report earlier this month. The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA). Some of the numbers in the report this year are just stunning.

While the number of complaints of cybercrime filed with IC3 increased 22% in 2009 compared to 2008, the total dollar losses increased a staggering 111% after four years of being relatively flat.

Annual Cybercrime Losses


Tim_Matthews | 31 Mar 2010 | 1 comment

At the recent RSA Conference in San Francisco, I had the pleasure of moderating a panel on the topic of data breaches and how to handle them.  Along with Larry Ponemon, Founder and Chairman of the Ponemon Institute, and Jerry Archer, SVP and CSO at Sallie Mae, was David Shettler from the Open Security Foundation (OSF), publishers of DataLossDB.

Post-panel, as we were walking back through Moscone, David answered a question I had been wondering about: When was the first reported data breach?  Turns out that it happened over a century ago, in 1896, where the dispensary records for the Southern California Hospital for the Insane went missing, and were thought to be stolen.  So protection of...

Shilpi Dey | 30 Mar 2010 | 0 comments

Shilpi Dey - Product Marketing Manager

PGP Universal Server 3.0 Administrator's Guide Last week, we held a webcast on the PGP Endpoint Data Protection 10/3.  Here's a link to the replay [registration required].  I ran out of time to answer all of the questions, but there were so many good ones so I decided to write a post to answer them.

Q:  Does PGP Whole Disk Encryption work on Windows 7? Can PGP Whole Disk Encryption integrate with Active Directory for a single password for PGP and the workstation?  When a user changes their AD password would this change their PGP passphrase as well?

A: Yes, PGP Whole Disk Encryption supports Microsoft® Windows7. For a detailed list of technical specifications, please visit...

Tim_Matthews | 23 Mar 2010 | 0 comments

This past Tuesday, we held a webcast on the new Massachusetts Data Protection Law, a.k.a. 201 CMR 17.  Here's a link to the replay [reg. required].  I ran out of time to answer all of the questions, but there were so many good ones so I decided it was worth writing a post to answer them.

Q: If you use a workgroup version of PGP Whole Disk Encryption can you still get reports on compliance or do you need the Universal Server to prove compliance?

A: Yes, PGP Whole Disk Encryption Workgroup Edition does provide basic reporting that you can use to demonstrate compliance.

Q: What is the impact of computer speed when the entire disk in encrypted?

A: We generally see negligible impact on performance once the initial encryption has taken place.

Q:  How does encrypting the BES server affect data on the hand held devices?

A: PGP Support...