magazine
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Lockdown<br />
ESET’s encryption solutions<br />
ensure your data is secure<br />
By Graham Cluley, We Live Security<br />
Shutterstock © andrey_l<br />
What’s the problem?<br />
A company without data is unimaginable. Data is the lifeblood<br />
of your business – it needs to flow safely between different parts<br />
of your organisation and between team members collaborating on a<br />
project. You cannot afford to lose any of it.<br />
And there are many ways for data to be shared: via email, shared<br />
folders, USB sticks, cloud-storage services, laptops and CD ROMs…<br />
the list goes on.<br />
The danger is that the movement of data poses a big risk for<br />
enterprise. As it travels between users and outside the company,<br />
it could either be leaked accidentally to unauthorized parties or<br />
intercepted and stolen by malicious hackers.<br />
Furthermore, sensitive information and databases stored on your<br />
corporate servers – if not protected properly – might be a tempting<br />
target for cybercriminals and online thieves.<br />
Barely a day goes by without an organisation becoming the<br />
unwelcome recipient of newspaper headlines announcing that<br />
customer data (such as credit card details, passwords or personal<br />
information) has been stolen.<br />
It has become clear that the danger is not just one of losing data<br />
related to your customers but of losing their trust to such an<br />
extent they no longer want to do business with you.<br />
What’s the solution?<br />
ESET provides encryption solutions which enable organizations<br />
to secure data.<br />
Business benefits<br />
l Full disk and removable media encryption<br />
protects data stored or sent using laptop<br />
computers.<br />
l File, folder and email encryption enables<br />
fully secure collaboration across complex<br />
work groups and team boundaries.<br />
l Security policy enforcement deployable at<br />
all endpoints.<br />
l A single MSI package meets data security<br />
compliance obligations.<br />
l Uniquely patented security key<br />
management allows full control of<br />
encryption keys and encryption security<br />
policy remotely and silently.<br />
l Patented hybrid cloud architecture means<br />
that all client and server connections are SSL<br />
encrypted, and all commands and data are<br />
AES or RSA encrypted.<br />
l Quick install and low system requirements<br />
bring enterprise-grade security to even the<br />
smallest organisations.<br />
Centralized policy management makes it easy to manage users and<br />
workstations and extend the protection of your company beyond the<br />
perimeter of your network. Encryption security can be painlessly rolled<br />
out, and even extended to mobile phones and home users.<br />
Even if encrypted data falls into the wrong hands or is contained<br />
on a device accidentally lost by an employee, your business can feel<br />
confident that the sensitive information will not be exposed.<br />
welivesecurity.com 19