21.04.2015 Views

magazine

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Lockdown<br />

ESET’s encryption solutions<br />

ensure your data is secure<br />

By Graham Cluley, We Live Security<br />

Shutterstock © andrey_l<br />

What’s the problem?<br />

A company without data is unimaginable. Data is the lifeblood<br />

of your business – it needs to flow safely between different parts<br />

of your organisation and between team members collaborating on a<br />

project. You cannot afford to lose any of it.<br />

And there are many ways for data to be shared: via email, shared<br />

folders, USB sticks, cloud-storage services, laptops and CD ROMs…<br />

the list goes on.<br />

The danger is that the movement of data poses a big risk for<br />

enterprise. As it travels between users and outside the company,<br />

it could either be leaked accidentally to unauthorized parties or<br />

intercepted and stolen by malicious hackers.<br />

Furthermore, sensitive information and databases stored on your<br />

corporate servers – if not protected properly – might be a tempting<br />

target for cybercriminals and online thieves.<br />

Barely a day goes by without an organisation becoming the<br />

unwelcome recipient of newspaper headlines announcing that<br />

customer data (such as credit card details, passwords or personal<br />

information) has been stolen.<br />

It has become clear that the danger is not just one of losing data<br />

related to your customers but of losing their trust to such an<br />

extent they no longer want to do business with you.<br />

What’s the solution?<br />

ESET provides encryption solutions which enable organizations<br />

to secure data.<br />

Business benefits<br />

l Full disk and removable media encryption<br />

protects data stored or sent using laptop<br />

computers.<br />

l File, folder and email encryption enables<br />

fully secure collaboration across complex<br />

work groups and team boundaries.<br />

l Security policy enforcement deployable at<br />

all endpoints.<br />

l A single MSI package meets data security<br />

compliance obligations.<br />

l Uniquely patented security key<br />

management allows full control of<br />

encryption keys and encryption security<br />

policy remotely and silently.<br />

l Patented hybrid cloud architecture means<br />

that all client and server connections are SSL<br />

encrypted, and all commands and data are<br />

AES or RSA encrypted.<br />

l Quick install and low system requirements<br />

bring enterprise-grade security to even the<br />

smallest organisations.<br />

Centralized policy management makes it easy to manage users and<br />

workstations and extend the protection of your company beyond the<br />

perimeter of your network. Encryption security can be painlessly rolled<br />

out, and even extended to mobile phones and home users.<br />

Even if encrypted data falls into the wrong hands or is contained<br />

on a device accidentally lost by an employee, your business can feel<br />

confident that the sensitive information will not be exposed.<br />

welivesecurity.com 19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!