TECH DIGITAL RESOURCE LIBRARY

Credant Technologies


Latest Content From Credant Technologies

Whitepaper: New Technology to Protect Against Insider Threats: Full Data Encryption2

by Credant TechnologiesMar 01, 2008

With incidents of internal threats on the rise, first-generation encryption products such as Full Disk Encryption are no longer the best endpoint security approach due to lack of protection against insider threats and significant manageability and usability issues. Due to legal imperatives against insider threats, enterprises need a solution with a data-centric, policy-based encryption approach that can be consistently enforced wherever the data resides, across all endpoints. The paradigm must shift from Full Disk Encryption to Full Data Encryption.

Unlike older encryption technologies, Credant's Policy-based Intelligent Encryption delivers a multi-layered encryption approach that provides comprehensive, critical business controls to ensure data is always within compliance. This layered technology fits nicely into a phased security implementation, and can be especially helpful for enterprises that prefer to roll out security methodically to minimize the impact on users, or for those who have different security policy requirements by user role or department.


Whitepaper: Advances in Endpoint Data Security

by Credant TechnologiesFeb 19, 2008

Data security has evolved beyond simply securing "bits on disks". To ensure data protection in today's dynamic IT environment, leading analysts recommend that security protects what matters most — the data. This requires a solution with a single, integrated security architecture and a data-centric, policy-based encryption approach that can be consistently enforced wherever the data resides — across heterogeneous endpoint device types, operating system platforms, and end users. The paradigm must shift from Full Disk Encryption to Full Data Encryption.

First generation encryption products such as Full Disk Encryption were designed over 15 years ago to protect primarily Windows-based endpoint devices. Unfortunately, this focus on the device means they were architected as stand-alone, platform-specific point products. There is no centralized console to consistently enforce or manage security across the various types of endpoint devices. From a data encryption perspective, these first generation products work by encrypting the entire hard drive, including the operating system and all application files. While this "encrypt everything" approach may, on the surface, seem like the easiest and most comprehensive approach to data security, it is not the best methodology in the long run due to lack of protection against insider threat and significant manageability, recovery, and usability issues.

Companies today need a Full Data Encryption Solution that simultaneously meets their security, IT operations, and compliance needs.