Subject: | |
From: | |
Reply To: | |
Date: | Fri, 15 Aug 2008 15:56:10 -0400 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Linda asked ".........what are encryption software for portable storage devices....."
Linda - this might be a much broader topic than simply encrypting USB drives etc. There are many other ways in which data can be exposed to unauthorized or unauthenticated people. This broader topic is encompassed as mobile data encryption and covers most of the endpoints that can cause vulnerability to organizational information via mobile devices.
Some key aspects of evaluating mobile data encryption vendors include - options for authentication and authorization, type and strength of encryptions used, what are the standard security certifications achieved, ability to centrally manage and control encryption, logging and monitoring, vulnerability testing and reporting.
There are a number of players in the mobile data encryption market (i've no affiliation with any of these - only provided as examples) - McAfee Endpoint encryption, CheckPoint, GuardianEagle to name a few.
Thanks
Ganesh Vednere
[log in to unmask]
This message contains information that may be privileged or confidential and is the property of the Capgemini Group. It is
intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to
read, print, retain, copy, disseminate, distribute, or use this message or any part thereof. If you receive this message
in error, please notify the sender immediately and delete all copies of this message.
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]
|
|
|