Hard drive encryption has never been easier

November 2011 Information Security, Security Services & Risk Management

As more organisations move to ensure the safety and confidentiality of information on their PCs and laptops, the need to encrypt hard drives has become more important. Fortunately, new technology makes the encryption of hard drives a simple, manageable process that occurs seamless to the user, while providing the optimal data security.

Safend Encryptor, which forms part of the Safend Data Protection Suite, is one of the leading technologies in this space. Distributed and supported by Magix Security, Safend Encryptor enforces policy-based encryption to protect the data stored on laptop and desktop hard drives.

Charmaine Geyer, Safend product manager at Magix Security explains that Safend Encryptor uses Total Data Encryption technology to automatically encrypt all data files on a hard drive, while avoiding the unnecessary encryption of the operating system and program files. “This minimises the risk of operating system failure, makes it easier to perform upgrades and has a negligible performance impact,” she says.

“More importantly, the solution provides transparent hard disk encryption, which means it seamlessly protects data without changing any end-user or helpdesk workflows. The installation and encryption happens while the user works. It can even stop when the user shuts down and resume when the computer is restarted. A small application called an agent is all that needs to be installed on the target computers for the encryption process to be initialised.”

Safend Encryptor provides companies with single sign-on (SSO) functionality, which means it makes use of the existing Windows login interface for user authentication and requires no changes to work processes. For large organisations, this is crucial as it means the user keeps on working as normal and does not require additional training.

“The SSO function results in there not being an additional password for users to remember,” adds Geyer. “And, since the encryption password is synchronised with Microsoft's Active Directory or Novell's eDirectory, lost passwords can be easily reset through the company's normal helpdesk procedures.”

Safend Encryptor provides full visibility and an audit trail that provides detailed logs and reports on security incidents, encryption status and administrative actions. In addition, it provides organisations with automatic key management and escrow. This means all encryption keys are centrally generated and securely stored on the Safend Management Server before encryption is initialised. A single management server can manage more than 75 000 agents, making it sufficient for most organisations in South Africa.

“To ensure that users' data remains secure, even if the user device is compromised, Safend Encryptor is tamper resistant. The agent includes multitiered anti-tampering capabilities to guarantee permanent control over enterprise endpoints. With Safend Encryptor, encryption becomes manageable, even for thousands of computers, while the user impact is minimal.

For more information contact Charmaine Geyer, Magix Security, +27(0)11 258 4442, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...