the future of endpoint encryptionwavesys.com/system/files/a4-uk-03-000322.1.03_br_sed-dell.pdf ·...

4
Your laptops and desktops are moving targets... p The Future of Endpoint Encryption

Upload: others

Post on 20-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Future of Endpoint Encryptionwavesys.com/system/files/A4-UK-03-000322.1.03_BR_SED-DELL.pdf · user recovery. Dell’s solution offers centralized control of encryption on laptops

Your laptops and desktops are moving targets...

p

The Future of Endpoint Encryption

Page 2: The Future of Endpoint Encryptionwavesys.com/system/files/A4-UK-03-000322.1.03_BR_SED-DELL.pdf · user recovery. Dell’s solution offers centralized control of encryption on laptops

Self-Encrypting Drives

Self-Encrypting Drives (SEDs): The Future of Encryption

SEDs are similar to standard hard drives, except they embed encryption into their core processor chip – making them the simplest, most secure way to encrypt endpoint data. That not only makes them impervious to software attacks, it also means they cost significantly less and greatly outperform conventional software encryption solutions. Encryption is always on, offering rock-solid certainty that data is encrypted for compliance reasons. Dell offers a wide-range of PC models with SEDs at little to no added cost.

Each of your laptops or desktops are literally moving targets and, until they are secure against attack, your business intelligence, reputation and bottom line are at risk. Most experts agree that by encrypting data on endpoints, corporate IT organizations can prevent data loss and demonstrate compliance with data privacy regulations. The question is: Which encryption solution is right for you?

The Challenges of Encryption

In choosing the encryption solutions for diverse desktops and laptops, IT organizations have to balance:

• Cost: Total cost of ownership includes acquisition costs together with the costs of deploying and managing encryption across a mixed platform environment.

• Manageability: How difficult is it for the IT organization to manage keys and support encryption across different platforms? Does the solution offer an easy migration path as you replace aging laptops and desktops?

• Enterprise fit/ease of use: Does it work with existing equipment? Will it impede productivity or slow down important applications?

• Compliance: Can you ensure that your data will remain safe and can you easily demonstrate compliance? What kind of auditing and reporting does it provide?

Page 3: The Future of Endpoint Encryptionwavesys.com/system/files/A4-UK-03-000322.1.03_BR_SED-DELL.pdf · user recovery. Dell’s solution offers centralized control of encryption on laptops

Self-Encrypting Drives

Low Cost of Ownership

SEDs reduce the cost of encryption with rapid deployment and transparent operations. Dell lowers the total cost of ownership of SEDs by simplifying and streamlining the management of these devices within the enterprise.

Managing Self-Encrypting Drives

Although SEDs eliminate any encryption deployment effort, IT needs enterprise-wide visibility and management of these devices and control over the security policies that govern them. If a user loses a password, for example, the data is unrecoverable. To put SEDs to work in the enterprise, you need policy-based management, compliance reporting, and end-user recovery.

Dell’s solution offers centralized control of encryption on laptops and desktops. Using policy-based access control, IT can limit access to encrypted information to authorized individuals, and remotely initialize, lock and erase drives. And Dell can help you demonstrate compliance with encryption policies in the event of a security breach.

Demonstrable Compliance

Dell helps you demonstrate compliance with the new EU data protection directive by monitoring, logging and reporting on all security events related to SEDs under management.

Enterprise Fit

With Dell, it’s easy to fit encryption into your enterprise data protection plan.

SEDs are standards-based technology supported by every major drive manufacturer, and included with many Dell PC models; encryption becomes part of the endpoint platform rather than an add-on.

Dell’s solution offers a Microsoft Management Console Snap-in for integrated enterprise management.

Encryption is completely transparent to the user, and does not affect boot time or application response times. Everything is automatically encrypted, without users needing to identify which data is sensitive.

Encryption for All Your Endpoint Needs

Dell believes that SEDs offer the most secure and best performing encryption at a cost that is substantially less than software alternatives. That means using self-encrypting drives in laptops and desktops where possible. However, because organizations often have IT infrastructure that mixes new and existing technology, Dell understands the need to protect information on removable media and existing PCs that don’t contain SEDs. And for this reason offers enterprise security management for Microsoft BitLocker®, encryption of removable storage devices like USB sticks and external hard drives and intelligent software encryption for older machines. Dell’s solutions work where you are and offer seamless migration and centralized encryption management as you refresh your laptop/desktop computers to include SEDs.

pp

p

Initialize, erase, and manage security policies for encrypted drives remotely

Add and remove authorized users quickly through one central console

Accelerate user recovery in case of lost or forgotten passwords

Synchronize Windows password for single sign and reduce help desk calls

pp

pp

If a computer is stolen or lost, no one else can access its data without the proper credentials. And a crypto-erase feature renders the data inaccessible by destroying the encryption key, for lost, stolen or decommissioned equipment.

Using Dell, IT organizations can demonstrate that data was encrypted in the event of a stolen laptop or security breach. In some cases, the ability to prove encryption eliminates the need to report breaches; greatly limiting any financial losses.

Page 4: The Future of Endpoint Encryptionwavesys.com/system/files/A4-UK-03-000322.1.03_BR_SED-DELL.pdf · user recovery. Dell’s solution offers centralized control of encryption on laptops

...the simplest, most secure way to encrypt endpoint data.

Wave Systems Corp. 480 Pleasant Street, Lee, MA 01238, USA +1-877-228-9283 • Fax +1-413-243-0045 www.wave.com

Copyright © 2012 Wave Systems Corp. All rights reserved. Wave logo is trademark of Wave Systems Corp. All other brands are the property of their respective owners. Distributed by Wave Systems Corp. Specifications are subject to change without notice.

A4-UK-03-000322/version 1.02 Release date: 09-24-2012

Central/Eastern EuropeExcellent Business Center –Westhafen Tower, Westhafenplatz 1D-60327 Frankfurt am MainGermany+49 69 959 32 [email protected]

Northern Europe104a Park StreetLondon W1K 6NG United Kingdom+44 1235 520956 [email protected]

Southern Europe,Africa & Middle EastLa Grande Arche-Paroi Nord92044 Paris La DefenseFrance+33 1 40 90 33 44 [email protected]

Israel32 Habarzel StreetTel Aviv 69710, Israel +972 3 6442662 [email protected]

NetherlandsJan PieterszoonCoenstraat 72595 WP The Hague Netherlands+31 (0) 70 799 [email protected]

Wave Systems EMEA

Wave Systems Corp. 480 Pleasant Street, Lee, MA 01238, USA +1-877-228-9283 • Fax +1-413-243-0045 www.wave.com

Copyright © 2012 Wave Systems Corp. All rights reserved. Wave logo is trademark of Wave Systems Corp. All other brands are the property of their respective owners. Distributed by Wave Systems Corp. Specifications are subject to change without notice.

A4-UK-03-000322-DELL/version 1.03 Release date: 10-12-2012