Past Winners

Symantec for PGP Whole Disk Encryption from Symantec Winner Winner

 

Information security professionals face considerable challenges protecting information on mobile computing devices, such as laptops and removable storage. In order to ensure that a lost or stolen device does not lead to unauthorized access to information, it is imperative to encrypt the data.

PGP Whole Disk Encryption from Symantec provides data protection for all information on a mobile computing device, including the user files, application data, operating system and swap partitions. A range of authentication options are available to ensure that only proper users access the data on the drive. The client can be centrally managed through PGP Universal Server in order to simplify administration, policy and reporting.

PGP Whole Disk Encryption works together with a range of encryption solutions from Symantec, ensuring that an organization can address immediate needs for data protection straight away, and address new needs over time. It offers broad platform support, including Windows (32 and 64 bit), Windows Server 2K8 and 2K3, Mac OS X, Linux Ubuntu, CentOS and Red Hat.

Strong management tools offer consolidated key management through PGP Universal Server, and consolidated security management console with the Symantec Protection Center.
In addition, the tool provides advanced support for Intel encryption technology. It works with Intel vPro for anti-theft and deprovisioning, and supports AES-NI crypto acceleration in all OS platforms.
It provides validations/certifications with the toughest cryptographic and security standards, including EAL 4-plus, FIPS 140-2, plus DIPCOG approved and CAPS approved.

The product source code is freely available for peer review, security analysis and to verify that there are no product back doors. Too, multiple methods of emergency access are available for users, as well as controlled access for administrators.

The IT department can ensure that information stays protected no matter where the user goes. Encryption protects any sensitive data that the user may possess. IT can thereby protect all laptops, servers, desktops and netbooks running Windows, Mac and Linux operating systems. All administration can be done in a single location, making administration easier and reducing help desk staffing requirements.

Consolidated key management reduces complexity in the environment – having encryption keys managed in a single location under strict controls makes it easier to ensure that encryption is being done properly, data is safe and adheres to security policies.

Organizations can deploy PGP Whole Disk Encryption to start protecting data on hard drives, and expand to address other encryption concerns without deploying more servers, clients or issue and provision more encryption keys. IT organizations can add a second encryption application through license activation rather than rolling out more software.

It is easy to deploy with practically zero downtime. Organizations can deploy the software, enroll the users and start encryption silently, and go from an unprotected state to a protected state without bringing the laptop in for service. Getting users deployed can be done through central administration, helping companies meet their goals for rollout on time and within budget. Users simply reboot their system and type in their passphrase for single sign-on all the way into Windows.

The Symantec encryption platform does not require organizations to go through the process of setting up more servers and encryption keys when addressing future data protection concerns. And, the tool ensures that encryption is well managed to avoid disaster scenarios. Poorly managed encryption can make data recovery costly or even impossible. Avoid the costs by ensuring that keys are well managed from the start.

As part of a long-term enterprise security strategy, PGP Whole Disk Encryption from Symantec reduces the risk of sensitive data exposure from loss or theft and ensures compliance accountability. On average, it costs $214 per lost record or $7.2M total to clean up a breach. That includes public disclosures, customer notifications, legal and audit fees and customer churn.

Further, compliance requires that organizations are able to prove that the information is encrypted. Symantec reporting tools can identify which systems are encrypted, ensuring adherence to security policy in the event of a lost device. Policy, event monitoring and reporting tools help companies identify their exposure to risk.

IDC's worldwide security software market share figures place Symantec as a leader in the three major categories: endpoint security, messaging security and data loss prevention.

 

Category description:

More and more employees are using smaller and smaller devices with loads of applications to access corporate data. Some examples include iPhones, iPads, Android devices, BlackBerries, and more. Products in this category deal with not only a collapsing perimeter, but also consumer-owned and -controlled devices being used to get at corporate resources. At a minimum, these devices likely will require strong endpoint security, point-to-point encryption and more. This is a broad category. If your product is used to secure this type of small device/handheld,. it may fit. Security can be for data at rest in the device itself, secure access to data in the enterprise, and encryption for data in motion between the enterprise and the device. Includes anything from hard disk encryption solutions and tools that track lost mobile devices to USB/thumb drive security solutions.