Travelling is always a Security education

I’ve been doing a lot of travelling lately and talking to lots of folks about data encryption and SecureDoc specifically. It’s always interesting to get a sense of people’s perceptions around the topic and key areas of interest like Self Encrypting Drives (SEDs).

Typically when I’m doing these info sessions and talking to partners and customers there are common questions I ask with which I expect a typical response. For instance:

“Does your organization currently use data at rest encryption?”  The answer is typically a mix of yes and no. But most recently, and refreshingly, the answer was 100 per cent yes at a session I went to this week. It was the first time I was in a room where every organization in the room said they used encryption.

“Does your organization currently use or is evaluating SEDs?” Typical response is a few sheepish hands of acknowledgement. If it’s a partner, it’s usually the majority of people in the room that know of SEDs and what they do at a high level.

Despite the surprising answers on the past couple of trips, there was something that really struck me about organizations that all said they used encryption. Specifically that a number of the organizations used more than one data encryption solution. This struck me as a complex and wholly unnecessary way to secure the data within their company. Fragmented data security solutions lead to fragmented reporting and inconsistent asset tracking and furthermore, loopholes that could lead to data breaches despite best efforts.

Standardizing on one management solution with a single console that can manage all data encryption within the enterprise; software encryption, hardware encryption, OS-based encryption etc. should be a priority and mandate for any large organization. Not only is it more cost-effective, it’s more secure and easy to manage from an IT administration standpoint.

That said, its great running into these organizations so we can talk about the power of a single console with SecureDoc and how to drive down TCO through the use of technology like PBConnex.

Previous Post
The Promise and Practice of UEFI for Full Disk Encryption
Next Post
Is that laptop worth $7 million?

Related Posts

All for One

As a specialized software company that focuses on data encryption and security with strengths in key management and overall encryption management, it’s extremely important to maintain strong relationships with OEMs. (more…)
Read more

Encryption only works if you use it

Once again there’s been a device theft that has left the personal health info (PHI) of 11,000 patients out in the open because the device was unencrypted. But when you look deeper into the problem, the organization did actually have…

Database Security

Buffer, a social media scheduling service, Buffer, found itself on the receiving end of a data-breach back in October. The culprit behind the breach was the company’s database provider. The breach resulted in the exposure of user account credentials that…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
 
Contact Us
 

This will close in 0 seconds