Security

When Encryption Isn't Enough:Trend Micro LeakProof Stops Data Leaks Where They Start

Download Now Free registration required

Executive Summary

It seems as though every week there are several highly publicized and embarrassing disclosures and reports of breaches of private information such as customer records, employee records, and intellectual property. In response to these threats from data leaks, many enterprises have successfully deployed or are in the process of deploying an encryption solution. For example, hard-drive encryption uses sophisticated mathematical functions to transform the data stored on a hard drive so that it can be read by an authorized user only with the corresponding key or password. The algorithm decrypts files while they are being read from the drive, so that it is transparent to authorized users.

  • Format: PDF
  • Size: 982.61 KB