Risk
11/17/2010
12:03 PM
50%
50%

Dell Introduces File Level Encryption

Available in locally and centrally managed options, Dell Data Protection Encryption, includes policy templates to support regulatory compliance and reporting.

Dell Data Protection Encryption Remote Management Console
(click image for larger view)
Dell Data Protection Encryption Remote Management Console

According to Dell, the encryption offered by Dell Data Protection Encryption is Federal Information Process Standards validated, and "provides auditing and regulatory compliance management for industry, federal and state regulations like the Healthcare Insurance Portability and Accountability Act and Payment Card Industry Data Security Standards."

Unlike whole-disk encryption, file-level level encryption does not need to interfere with IT administration, patching, backup or migration.

"Sector-based encryption, which treats encryption as a drive technology, has deployment and other issues," observed Konetski. "Deploying file-based encryption, for example means there is no need to erase disks and to Chkdsk or reformatting on a drive to make sure there are no bad sectors and no data left visible. Backups don't require full decryption, and, Konetski said, "To migrate data for machine end-of-life, or in the event of a catastrophic failure, you simply move files over and transfer the keys. When we developed this product, we had experience in deploying and supporting encryption on endpoints. So we are familiar with the pain points in wanting to do and maintain encryption."

Dell Data Protection Encryption includes compliance templates to help set up policies that comply with the relevant regulations and generate needed reports. According to Dell, the files to be encrypted can be specified, for example, based on end-user profile, data sensitivity and compliance needs.

Volume licensing is available for Dell and non-Dell systems for both Windows and Mac. Through a relationship with Credant, Dell offers optional support for encryption on select smartphones and non-Windows OS. There is also a stand-alone version of the solution that can be used by end-users.

Pricing for the SMB version is $59.99/seat, and includes a local management console. Pricing for the managed enterprise version seats is $85/seat for 1 to 999 seats, including console and client agent.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1414
Published: 2015-02-27
Integer overflow in FreeBSD before 8.4 p24, 9.x before 9.3 p10. 10.0 before p18, and 10.1 before p6 allows remote attackers to cause a denial of service (crash) via a crafted IGMP packet, which triggers an incorrect size calculation and allocation of insufficient memory.

CVE-2015-2072
Published: 2015-02-27
Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA 73 (1.00.73.00.389160) and HANA Developer Edition 80 (1.00.80.00.391861) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) ide/core/plugins/editor/templates/trace/hanaTraceDetailService.xsjs or...

CVE-2015-2075
Published: 2015-02-27
SAP BussinessObjects Edge 4.0 allows remote attackers to delete audit events from the auditee queue via a clearData CORBA operation, aka SAP Note 2011396.

CVE-2015-2076
Published: 2015-02-27
The Auditing service in SAP BussinessObjects Edge 4.0 allows remote attackers to obtains sensitive information by reading an audit event, aka SAP Note 2011395.

CVE-2015-2101
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in the Navigate bar in the Navigate module before 6.x-1.1 and 7.x-1.x before 7.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industrys professional organizations about how security pros can get more involved with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.