VISIT LIBRARY SPONSOR A BOOK HOW IT WORKS NEWSLETTER FEEDBACK

Endpoint Data Encryption That Actually Works

by Don Jones

SYNOPSIS

Many businesses have tried endpoint data encryption, often opting for full-disk encryption (FDE) solutions. Unfortunately, many of those businesses quickly realize that their encryption solution isn't fully-compatible with their IT management systems and process - and often aren't compatible with their users, either! In this series of concise articles, IT expert Don Jones analyzes the reasons why encryption systems typically present so many unforeseen challenges, and examines the capabilities and processes you should look for in an endpoint encryption system that will actually be usable by your business and employees.


CHAPTER PREVIEWS

Article 1: Why Businesses Need Endpoint Encryption

Does your business use endpoint encryption to protect data? If not, why not? Does your business know what endpoint encryption actually is, what it offers, and why you might want to use it? Do you know the potential disadvantages, and are you aware of subtle technology differences that can make a tremendous positive impact on your business?


Article 2: Why Endpoint Encryption Can Fail to Deliver

As I mentioned in the first article in this series, many companies start exploring endpoint encryption and quickly become disappointed. The technology doesn't seem transparent enough, isn't centrally manageable, or perhaps doesn't work well with their existing systems and processes. What, exactly, goes wrong?


Article 3: Making Endpoint Encryption Work in the Real World

If traditional endpoint encryption—full-disk encryption and simple file-and-folder encryption—don't do a great job of solving today's business needs, then what would? What kind of endpoint encryption would solve more of the critical data protection needs for today's businesses?