Critical System Protection

 View Only

TechTip: Protecting Data Using Endpoint Encryption 

Apr 14, 2009 02:46 PM

Today's workforce is expanding and growing increasingly mobile with each passing year.  As recently as a decade ago, most of us were still sitting at desks typing on computers and answering landlines, and USB storage devices were nonexistent.  But today nobody has to be tied to a desk at an office all day long, and data storage is no longer relegated to just desktop computers and servers located in a building.  Because of laptop computers, removable storage devices, remote desktops, and handheld computers, organizations can store information in numerous places.  However, with an expanding number of endpoints to secure, it’s easier than ever before for that information to fall into the wrong hands. 

 

Businesses of all sizes need to take a proactive approach to prevent unauthorized access to these endpoints by deploying powerful encryption and access control technologies. An endpoint encryption solution is critical for at least three important reasons:

  1. Legislation.  Consumer data protection laws dictate that if a company believes their data has been compromised either unintentionally or maliciously, they are legally obligated to disclose that breach publicly.  So if a laptop, mobile storage device, desktop, or any other computer system is lost or stolen, the company that owns that device must tell consumers that the security of their information may be at risk.  However, if a company can prove that the compromised endpoints were encrypted, they are not required to disclose the breach to the public.

  1. Compliance.  Managing IT devices and protecting information is more complex than ever due to the numerous regulations, standards, and governance mandates that businesses must adhere to.  Compliance laws demand that businesses go beyond rudimentary policies and standard security procedures.  Loss of business-critical data can affect more than business continuity; it can result in penalties, restrictions, and even business failure. Encryption of endpoint devices helps businesses meet government directives and regulations and offers a full audit trail.

  1. Cost.  Protecting information also protects budgets.  According to business analysts, the average cost of a security breach in 2007 was $6.3 million per incident[1].  And expenses aren’t just limited to the cost of disclosure, replacing hardware, and paying fines; the cost to a company’s reputation is incalculable.  When news of a data security breach becomes public, a company’s image can quickly become tarnished.  If people lose trust in the company, the resulting brand erosion translates into additional lost revenue. 

To improve compliance and control costs, businesses need to deploy a comprehensive encryption strategy to protect data stored on every endpoint in their organization.  Symantec Endpoint Encryption is a policy-driven, information-centric solution from Symantec that is operationalized to protect increasing amounts of data moving among various environments and devices. Symantec Endpoint Encryption offers the following features:

  • Supports multiple users and administrators on individual machines and devices
  • Uses passwords and authentication protocols to ensure that only authorized individuals have access to data
  • Easy-to-use central management features natively integrate with Active Directory
  • All users and group policy management is contained within a single console
  • Encryption is transparent to the end user and has minimal performance impact
  • Secures data on desktops, servers, USB, FireWire, Compact Flash, iPod, and other storage devices and media

Endpoint encryption protects your information and sensitive data, reduces liability, and helps ensure compliance.  For more information about how Symantec Endpoint Encryption can help your company keep data secure, click here.



[1] Ponemon Institute, 2007 Annual Study: Cost of a Data Breach

Statistics
0 Favorited
0 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Comments

Jun 01, 2009 05:33 PM

Hi just subscribe this Idea like me, and Eric, perhaps can you do something for that ?
www-secure.symantec.com/connect/idea/forum-symantec-endpoint-encryption ;-)

Related Entries and Links

No Related Resource entered.