This page contains a Flash digital edition of a book.
The benefits of a full-disk encryption solution are many. The encryption and decryption process is transparent, so users never have to pick which data to encrypt, nor do they need to remember to encrypt sensitive documents. Unlike file and folder encryption, which relies on user interaction, users don’t need to do anything to protect their critical data, other than install the full-disk encryption software. And because full-disk encryption also protects temporary and swap files, it is much more secure than simple file/folder encryption.


The Good Full-disk encryption can also help


ensure regulatory compliance. Laws or industry rules might require an organization to protect sensitive data, which can include intellectual property or personal information such as credit card numbers. Failing to protect such data properly can lead to hefty fines, legal battles and severely compromised reputations. If a notebook protected by full-disk encryption is lost or stolen, however, the organization is often absolved of any wrongdoing and not required to announce the mishap. Many full-disk encryption systems


also support pre-boot authentication, which prevents unauthorized users from getting into a protected computer. Even the startup OS files are inaccessible, thus adding another layer of protection. In addition, unauthorized users can’t use alternative boot media to start up the system or access its files. With full- disk encryption, all data is protected.


The Bad One of the drawbacks of a full-disk encryption solution is that it can affect a notebook’s performance. By some measures, such programs can double hard-disk access time, particularly if virtual memory is involved. Full-disk encryption technology has made significant strides, however, and users often won’t even notice it’s there. Still, full-disk encryption usually results in longer boot times because of the proprietary OS that intercepts the normal startup routine. That extra time shouldn’t pose a problem if you know it’s coming.


IMAGE © FOTOLIA CONNECTION/BUSINESS IT 2012.Q4 25


Perhaps the bigger issues have


to do with implementation and management. Deploying a full-disk encryption solution means that administrators have one more app to roll out and support. In addition, deploying full-disk encryption can be a complex process and therefore costly. Licensing fees and training must be taken into account. IT must also have processes to set


up the user accounts needed to access the proprietary OS boot-up system. In addition, admins must enforce authentication policies—such as for password complexity and expiration— and manage the authentication data on an ongoing basis.


The Ugly Of course, the full-disk encryption


solution must itself be managed from day-to-day, which involves not only making sure that the application keeps running, but also ensuring that support procedures and documentation are in place should it stop. This brings us to a full-disk encryption user’s biggest nightmare: The software gets corrupted or fails, leaving the system in an unrecoverable state. In such cases, the full-disk encryption solution becomes the user’s—and subsequently, IT’s— greatest enemy. A full-disk encryption solution is effective because of its ability to protect all data, but that feature can make it impossible to recover data if the software fails. And if no reliable and recent backup exists, everything may be lost.


Better Than Nothing Despite the disadvantages of


full-disk encryption solutions, they’re still among the most useful mechanisms available for protecting a notebook, short of handcuffing the device to the CTO’s wrist. However, an effective full-disk encryption solution should have a minimal impact on worker productivity and be relatively easy for IT to deploy and manage. Of course, each organization has to


weigh the risks associated with losing sensitive data against the resources necessary to implement and maintain a full-disk encryption solution. In this world of ever-increasing mobility, however, few organizations can afford to have one of their notebooks unprotected should it go missing.


ABOUT THE AUTHOR


Robert Sheldon is a technical consultant and freelance technology writer. He has authored numerous books, articles, and training material related to Microsoft Windows, relational database management systems, and business intelligence design and implementation.


Our Goal Is Simply Stated


We Make IT Work for You We strive to create a foundation for long-lasting, rewarding partnerships, offering expert guidance, exceptional service, and innovative strategies to empower you to make informed IT investment decisions. When you partner with us, you will receive: • Technology solutions • Support throughout the IT lifecycle • Dedicated account teams • Software licensing • Access to premier technology certifications and product authorizations • Availability • Rapid response • Custom configuration • Efficient procurement tools


Call today to learn more about our assessments and services. 1.800.800.0014 www.pcconnection.com


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36