Velocity Reviews - Computer Hardware Reviews

Velocity Reviews > Newsgroups > Computing > Computer Security > Mailing List dedicated to Full Disc Encryption use and implementation strategy

Reply
Thread Tools

Mailing List dedicated to Full Disc Encryption use and implementation strategy

 
 
Saqib Ali
Guest
Posts: n/a
 
      10-01-2006
In the light of recent laptops theft and data security breaches, large
corporations and government institutions are looking at various Full
Disc Encryption (FDE) solution to protect their confidential data on
mobile devices. While it may be easy to choose and implement a Full
Disk Encryption in a small office, it is not the case with large
institutions. These institutions are struggling with the design and
architecture of the FDE and key management solutions. The design has
to account for the key management solution in case of accidental
destruction of the encryption key or employee leaving the company
without handing over the encryption tokens/keys. The design also has
to account for requirements for proper imaging of the HDD in case the
OS and all the data have to be revived to its original form. Hardware
Token and USB Key as a mean of authentication is also a point of
discussion.

There are multiple tools available in the market that allow for full
disk encryption. However they vary greatly. They are divided into two
main categories - hardware based and software based. The hardware
based full disk encryption solutions are considerably faster than the
software based solutions, and usually produce no overhead for the CPU
or the HDD. The software based solutions, while inexpensive, create
considerable overhead for the CPU depending on the type of encryption
used.

A limited number of full disk encryption solutions also support
Trusted Platform Module to tie the encrypted HDD to a particular
platform. TPM can make the key recovery possible and simplify single
sign on.

To address the questions and concerns mentioned above I have decided
to create a mailing list dedicated to Full Disk Encryption Technology
and Key Management solutions.

To subscribe, please email http://www.velocityreviews.com/forums/(E-Mail Removed)-dev.com
("This is Ad-Free Mailing List, so please DO NOT join if you only want
to advertise your products"). Also please DON'T inquire about adding
Ads to footer of the email.

Vendors are welcome to join if they bring constructive feedback to the
discussion.

This mailing list will be moderated for all new members.

Thanks
Saqib Ali

 
Reply With Quote
 
 
 
Reply

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
So why don't we use full disk encryption on all mobile devices? Saqib Ali Computer Security 24 12-16-2009 11:30 PM
Choosing a network implementation strategy Qu0ll Java 7 12-04-2007 03:34 AM
U.S. Gov't to use Full Disk Encryption on All Computers Saqib Ali Computer Security 22 01-05-2007 05:32 AM
Newsgroups, forums or mailing lists dedicated to J2EE/EJB? jan_bar Java 1 11-09-2006 12:44 AM
[ANN] Dedicated Rails mailing list David Heinemeier Hansson Ruby 0 10-14-2004 01:20 PM



Advertisments