Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:30 AM

Sony Taps PGP Encryption

Sony Computer Entertainment Europe has selected PGP Whole Disk Encryption for Enterprises

PALO ALTO, Calif. -- PGP Corporation, a global leader in enterprise data security and encryption solutions, today announced that Sony Computer Entertainment Europe Ltd. has selected PGP(R) Whole Disk Encryption for Enterprises to secure enterprise data and comply with international data privacy and financial accounting regulations. Sony Computer Entertainment Europe (SCEE) is responsible for distribution, marketing, and sales of PlayStation(R) software and hardware across Europe, the Middle East, Africa, and Oceania and will implement PGP Whole Disk Encryption to secure the laptops used by 1,100 employees in nine countries.

PGP Whole Disk Encryption transparently encrypts the entire hard disk of a computer, protecting confidential and sensitive information from loss or theft. Industry analysts such as Gartner believe that full disk encryption can help prevent data breaches due to lost or stolen laptops and suggest organizations consider such solutions as part of a comprehensive information security strategy.

"Hard disk encryption of mobile computers is an essential part of our compliance strategy," said Simon Leggett, European Technical Services Manager at Sony Computer Entertainment Europe Ltd. "SCEE chose PGP Whole Disk Encryption because it is easy to deploy, administer, and use. And because PGP Corporation offers a comprehensive, integrated encryption platform, we can immediately deploy the disk encryption solution we need and add other capabilities such as email protection later."

Regulations such as the U.S. Sarbanes-Oxley Act (SOX) and the EU Data Privacy Directive require that companies implement internal controls to prevent unauthorized access to confidential and financial data, including information stored on mobile computing devices. As a result, organizations are increasingly turning to solutions such as PGP Whole Disk Encryption to secure all data stored on desktop and laptop computers. PGP Whole Disk Encryption locks the entire contents of a laptop, desktop, external drive, or USB flash drive, safeguarding data from unauthorized access. The encryption is quick, transparent, and centrally deployed and managed, preventing users from circumventing it.

"We are pleased that Sony Computer Entertainment Europe -- an industry leader -- has selected PGP encryption to protect information stored on employee computers," said Phillip Dunkelberger, president and CEO of PGP Corporation. "We are definitely seeing an increase in the number of European companies interested in implementing the unified PGP(R) Encryption Platform to help meet information security regulatory requirements."

PGP Corp.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.