Today critical data protection has become increasingly difficult. Meeting GDPR compliance requirements, using data encryption, thus preventing data breach, has been one of the major concerns of information security teams, even more so when it is increasingly common for their employees to take electronic devices to work. And vice versa.
How is data encryption important? What to do to avoid data loss in scenarios like these?
Today, data loss due to information leakage incurs serious compliance problems with legislation, which aims to protect sensitive user data. Currently, the law provides for notifications and punishments depending on the severity.
However, most laws indicate that a breach has NOT occurred if you can prove encryption of lost device data.
The loss of a notebook, for example, can have a negative impact on several sectors, both retirement and your company’s customers’ reliability, reputation, competitive advantage.
What solutions for data encryption currently exist?
A good solution to this problem is Trend Micro Endpoint Encryption (TMEE).
TMEE provides a unified solution for encrypting data across multiple devices using a central server to manage policies and audit information.
It consists of 4 agents:
Full Disk Encryption (FDE): Provides a complete access control solution through data encryption and authentication methods. With FDE, protected data cannot be accessed until the user has authenticated himself on the client;
File Encryption (FE): This agent is responsible for providing data encryption solution for removable devices (USB devices), files or folders. It allows selective encryption, meaning you can choose what you want to encrypt. It also allows file transfer between systems. With FE it is not necessary to encrypt the entire disk;
Encryption Management for Apple FileVault and Encryption Management for Microsoft BitLocker for Microsoft or Apple solutions. Another big advantage is that all clients are managed from Control Manager;
Control Manager is a management service capable of configuring and pushing policies to all clients to control all aspects of security functionality implemented by those policies. The agents then report all audit logs, detailing the actions taken on the agent.
These logs can be viewed by administrators to determine the status and health of protected systems. With it, you can enforce security policies for individual users and groups from a single server. It is also possible to instantly send lock commands (a feature that locks the station until an administrator intervenes) or erase (completely erases the remote disk) to the protected device that has been lost or stolen.
How is your company’s data encryption going and how is it prepared to react in the face of possible data loss?
Posted by: Paul Mccarthy Scam