Hard drive encryption has never been easier

November 2011 Information Security, Security Services & Risk Management

As more organisations move to ensure the safety and confidentiality of information on their PCs and laptops, the need to encrypt hard drives has become more important. Fortunately, new technology makes the encryption of hard drives a simple, manageable process that occurs seamless to the user, while providing the optimal data security.

Safend Encryptor, which forms part of the Safend Data Protection Suite, is one of the leading technologies in this space. Distributed and supported by Magix Security, Safend Encryptor enforces policy-based encryption to protect the data stored on laptop and desktop hard drives.

Charmaine Geyer, Safend product manager at Magix Security explains that Safend Encryptor uses Total Data Encryption technology to automatically encrypt all data files on a hard drive, while avoiding the unnecessary encryption of the operating system and program files. “This minimises the risk of operating system failure, makes it easier to perform upgrades and has a negligible performance impact,” she says.

“More importantly, the solution provides transparent hard disk encryption, which means it seamlessly protects data without changing any end-user or helpdesk workflows. The installation and encryption happens while the user works. It can even stop when the user shuts down and resume when the computer is restarted. A small application called an agent is all that needs to be installed on the target computers for the encryption process to be initialised.”

Safend Encryptor provides companies with single sign-on (SSO) functionality, which means it makes use of the existing Windows login interface for user authentication and requires no changes to work processes. For large organisations, this is crucial as it means the user keeps on working as normal and does not require additional training.

“The SSO function results in there not being an additional password for users to remember,” adds Geyer. “And, since the encryption password is synchronised with Microsoft's Active Directory or Novell's eDirectory, lost passwords can be easily reset through the company's normal helpdesk procedures.”

Safend Encryptor provides full visibility and an audit trail that provides detailed logs and reports on security incidents, encryption status and administrative actions. In addition, it provides organisations with automatic key management and escrow. This means all encryption keys are centrally generated and securely stored on the Safend Management Server before encryption is initialised. A single management server can manage more than 75 000 agents, making it sufficient for most organisations in South Africa.

“To ensure that users' data remains secure, even if the user device is compromised, Safend Encryptor is tamper resistant. The agent includes multitiered anti-tampering capabilities to guarantee permanent control over enterprise endpoints. With Safend Encryptor, encryption becomes manageable, even for thousands of computers, while the user impact is minimal.

For more information contact Charmaine Geyer, Magix Security, +27(0)11 258 4442, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.