Home > recovery passwords > Protecting Your Sensitive Information with Encryption
Protecting Your Sensitive Information with Encryption
Posted on Monday, June 20, 2011 by Arman Zulhajar
E-Mail Encryption: Lots of Choices, Plenty of Tradeoffs
“Lost or stolen data can cripple a business’s reputation and fnancial standing,” says Than Tran, product marketing manager at PGP Corp. of Palo Alto , Calif. “A business must ensure e-mails containing sensitive information are kept secure and that they comply with privacy laws to assure safe transactions for their customers and the privacy of their employees.”
Encryption Systems
Tran explains that there are several different methods of e-mail encryption. Endpoint-to Endpoint represents full encryption from the originating device to the recipient device. This method provides the highest level of security by allowing no intervening points at which plaintext data can be read by anyone but the intended parties. The drawback is that this mode also creates the greatest amount of complexity from an implementation, administration, and management perspective. This complexity mainly results from the fact that encryption software must be installed and maintained on the endpoint that integrates with the client e-mail reader software.
“Another variation on this is Gateway-to-Gateway,” says Tran. “It is like Gateway-to-Endpoint, but adds an encryption gateway on the recipient’s side, thus eliminating desktop software and administrative costs on that end as well.”
Finally, there is Gateway-to-Web, which provides access to sensitive data via a Web server, possibly co-located on the gateway itself. The data is typically protected via transport layer encryption, such as Secure Sockets Layer (SSL). This allows secure communication to occur with any recipient, regardless of its architecture or level of sophistication.
“In this scenario, a standard message is sent to the recipient, advising that a secure message is waiting at the gateway,” says Tran. “The recipient retrieves this message via a secure connection, which may also require authentication with credentials delivered by an out-of-band mechanism.”
PGP Encryption
It is supplemented at the desktop level by PGP Desktop Email, which is managed by PGP Universal, to secure e-mail, data stored on disk, and AIM traffc. It also provides digital signature capability.
“PGP Whole Disk Encryption technology is used for full disk encryption, securing all date including often overlooked temporary, swap, and hibernation fles that include copies of sensitive data, fles and e-mails,” says Tran. “As a business grows and requires more bandwidth/security it is best to then upgrade to PGP Universal Series, a robust and scalable e-mail encryption platform.”
Choose Wisely
Tran offers some advice for businesses with regard to e-mail encryption.“The challenge for e-mail encryption is to select a solution that will support the growth and changes within the business’s e-mail architecture and will also be leveraged by non-email applications requiring encryption services,” he says. “It is absolutely vital for a company to encrypt not just e-mails but also fles that contain sensitive information with the highest level of protection. It can be a costly and devastating set back to a business, if sensitive data is exposed to unintended personnel.”
Reason? According to Gartner, 84 percent of high-cost security incidents occur when insiders send confdential data outside the company without properly securing the data.“Different companies have different needs and should assess its own risk before deciding to implement a security solution,” says Tran. “Furthermore, it is critical that a business conducts frequent audit of its security procedures, processes and technologies in order to comply with ever changing regulations.”
Category Article email, password auditor, Protect, recovery passwords
Random Posts
-
In Angry Birds 2-14, you have 4 white Angry Birds that can drop explosive eggs. You must beat 4 pigs to pass this level. If you're look...
-
Using WiFi Access Point (WAP) is actually tricky. If you use a different modem and WAP brands such as TP Link modem and WAP SMC or Asus br...
-
Angry Birds 5-12 walkthroughs are so useful for you who need idea to beat Angry Birds 5-12 Mighty Hoax. Maybe, Angry Birds level 5-12 is ha...
-
My apologies to the vast majority who voted for a facebook page. I have read through the privacy policy on facebook and rushed to delete my ...
-
I have received a couple of emails asking about hair thinning and hair loss (not relaxer related but for natural hair). I am happy to do the...
Powered by Blogger.
Blog Archive
-
▼
2011
(3255)
-
▼
June
(184)
- Ghost Scepter - Dota Item
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - Facebook Games News
- Etheral Blade - Dota Item
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - FrontierVille Cheats Videos
- Isla Dorada Episode 1: The Sands of Ephranis [BETA]
- Midsummer creatures
- Download Dota Ringtone for Your Cellphone
- Google Alert - FrontierVille Latest Cheats
- Oddly Enough Pied Piper [BETA]
- Sphera [BETA]
- 4 Elements 2 [BETA]
- Cradle Of Egypt [BETA]
- Ninja Puzzle [FINAL]
- Urn of Shadows
- Mahjongg Artifacts 2 [FINAL]
- Nanda's Island [FINAL]-BFG
- QuadSmash [FINAL]
- The Microbie Story [FINAL]
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Herofy [FINAL]
- Garden Spirits [BETA]
- Google Alert - Facebook Games News
- Khadgar's Pipe of Insight
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Sandra Fleming Chronicles: The Crystal Skull [BFG-...
- Differences between HTML 4 and HTML5
- Increase Traffic to Your Blog
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Tales From The Dragon Mountain: The Strix [FINAL]
- Grim Facade: Mystery of Venice Collector’s Edition...
- Google Alert - FrontierVille Latest Cheats
- Camy Adventures - Episode 1 [FINAL]
- Google Alert - Facebook Games News
- What to Do When a Laptop is Stolen???
- Review: Cisco RV220W Wireless-N Network Security F...
- The Fall Trilogy: Chapter 3 - Revelation [FINAL]
- New Dota Hero: Ymir - Tuskarr
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - FrontierVille Cheats Videos
- Val'Gor 2: The Beginning [FINAL]
- Jessica's 2 Dash Pack [FINAL]
- Virtual Farm 2 [FINAL]
- Jessica's Bow Wow Bistro [FINAL]
- Energy Vampires: Strange Comments and Emails
- Dota 6.70 Map Free for Download
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Ghost Towns: The Cats Of Ulthar [BETA]
- Mystery Valley: Extended Edition [FINAL]
- Blossoms at home
- Smoke of Deceit - New Dota Item on Dota 6.70
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- How Public Key Cryptography Works ?
- Protecting Your Sensitive Information with Encryption
- Ancient Janggo of Endurance - New Dota Item on Dot...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Juliet's Fashion Empire [BETA1]
- Research time: What questions do you want answered?
- Medallion of Courage - New Dota Item on Dota 6.70
- The pilot outfit
- Veil of Discord - Dota Item
- Secrets of the Dark: Temple of Night Collector's E...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Hello!
- Classic Fishdom 2 in 1 Pack [FINAL]
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Short vs Long
- Doodling while rendering....Looks like some animal...
- Grand Magnus (Rubick) - Dota Hero
- Hide and Secret 4: The Lost World [FINAL]
- Death Under Tuscan Skies: A Dana Knightstone Novel...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- The perfect light conditions
- Short Natural Hair: The Flat Twist
- "7 Secrets of Internet Millionaires"
- Proactive Password Auditor
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Puppy Sanctuary [BFG-FINAL]
- Bicycle Skat [FINAL]
- The Timebuilders 2: Caveman's Prophecy [FINAL]
- Echoes Of The Past 3: The Citadels Of Time [BETA]
- Google Alert - Facebook Games News
- Short Natural Hairstyles: Curly Chellez
- Download Dota Map 6.72c
- Angry Birds 1.5.2 [FINAL]
- It's not enough!
-
▼
June
(184)