Date Added: Jul 2009
It seems as though every week there are several highly publicized and embarrassing disclosures and reports of breaches of private information such as customer records, employee records, and intellectual property. In response to these threats from data leaks, many enterprises have successfully deployed or are in the process of deploying an encryption solution. For example, hard-drive encryption uses sophisticated mathematical functions to transform the data stored on a hard drive so that it can be read by an authorized user only with the corresponding key or password. The algorithm decrypts files while they are being read from the drive, so that it is transparent to authorized users.