Risk
11/17/2010
12:03 PM
Connect Directly
RSS
E-Mail
50%
50%

Dell Introduces File Level Encryption

Available in locally and centrally managed options, Dell Data Protection Encryption, includes policy templates to support regulatory compliance and reporting.

Dell Data Protection Encryption Remote Management Console
(click image for larger view)
Dell Data Protection Encryption Remote Management Console

According to Dell, the encryption offered by Dell Data Protection Encryption is Federal Information Process Standards validated, and "provides auditing and regulatory compliance management for industry, federal and state regulations like the Healthcare Insurance Portability and Accountability Act and Payment Card Industry Data Security Standards."

Unlike whole-disk encryption, file-level level encryption does not need to interfere with IT administration, patching, backup or migration.

"Sector-based encryption, which treats encryption as a drive technology, has deployment and other issues," observed Konetski. "Deploying file-based encryption, for example means there is no need to erase disks and to Chkdsk or reformatting on a drive to make sure there are no bad sectors and no data left visible. Backups don't require full decryption, and, Konetski said, "To migrate data for machine end-of-life, or in the event of a catastrophic failure, you simply move files over and transfer the keys. When we developed this product, we had experience in deploying and supporting encryption on endpoints. So we are familiar with the pain points in wanting to do and maintain encryption."

Dell Data Protection Encryption includes compliance templates to help set up policies that comply with the relevant regulations and generate needed reports. According to Dell, the files to be encrypted can be specified, for example, based on end-user profile, data sensitivity and compliance needs.

Volume licensing is available for Dell and non-Dell systems for both Windows and Mac. Through a relationship with Credant, Dell offers optional support for encryption on select smartphones and non-Windows OS. There is also a stand-alone version of the solution that can be used by end-users.

Pricing for the SMB version is $59.99/seat, and includes a local management console. Pricing for the managed enterprise version seats is $85/seat for 1 to 999 seats, including console and client agent.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio