General discussion


Data security - without the inconvenienc

By john.davis4 ·
I have taken an excerpt from a Techrepunblic posted article last year that you will find below. In looking at these questions, we developed a product, called KeyDrive, ( answers every single one of the points strongly and I would welcome feedback as to the usefulness of such a product. Yes, this is a sales pitch - but with a difference. By listening to your input, we can ensure that the product is right for you, good for the user and provides a sensible ROI for all concerned. Your opinions matter - tell me what you think....

Security managers tasked with developing and implementing enterprise-level policies and procedures for laptop protection are typically faced with several key questions that will affect vendor selection. These questions must be answered before tendering an RFP.

Does the entire laptop hard drive need to be encrypted, or is there a need to protect only select files, subdirectories, logical volumes, or physical partitions on the laptop?
Will a standard personal identification number (PIN) and password be a sufficient means of authentication for laptop access control, or will a hardware token (possibly wireless) be required to increase the security of this process?
What mechanism is available to recover documents from an encrypted state when normal procedures need to be bypassed or overridden?
How transparent must the application be for users to accept it without objection?
What is the likelihood in the future that these laptop protection procedures will need to be extended to include PDAs using wireless or Bluetooth protocols?
Should an effort be made to physically retrieve a stolen or lost system, or should it be written off?

This conversation is currently closed to new comments.

2 total posts (Page 1 of 1)  
| Thread display: Collapse - | Expand +

All Comments

Back to IT Employment Forum
2 total posts (Page 1 of 1)  

Related Discussions

Related Forums