{"id":33076,"date":"2017-08-21T04:45:22","date_gmt":"2017-08-21T08:45:22","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/eset-reveals-what-to-watch-out-for-before-you-buy-encryption-securitybrief-nz.php"},"modified":"2017-08-21T04:45:22","modified_gmt":"2017-08-21T08:45:22","slug":"eset-reveals-what-to-watch-out-for-before-you-buy-encryption-securitybrief-nz","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/eset-reveals-what-to-watch-out-for-before-you-buy-encryption-securitybrief-nz.php","title":{"rendered":"ESET reveals what to watch out for before you buy encryption &#8211; SecurityBrief NZ"},"content":{"rendered":"<p><p>    Encryption services are becoming a focus for organisations and    decision makers as new data protection laws such as the GDPR    come in  but when faced with a market flooded by various    products and little time to make the right choice, it can be    difficult to find the one that best fits individual needs, ESET    says.  <\/p>\n<p>    The company has assembled a list of the five questions    organisations should ask before buying encryption.  <\/p>\n<p>    1.Which    laptops present the biggest risk; on-site or off-site?  <\/p>\n<p>    This might seem like a pointless question with an obvious    answer; systems are more liable to loss or theft when away from    the office, but making this distinction and keeping it in mind    is the right place to start and when you have settled on a    solution, be sure to test its effectiveness at managing problem    scenarios for your remote users.  <\/p>\n<p>    2.Does the    system offer full remote control of off-site endpoint    encryption that fits your IT department?  <\/p>\n<p>    All major Endpoint Encryption products offer the means to    manage remote systems, but look carefully at the    requirements. Most need either an open incoming    connection to a demilitarized zone (DMZ) on your Server, or a    VPN connection. All involve a higher level of IT skills    and additional costs and may require the user to initiate the    connection to function; not much use with a rogue employee or    stolen laptop. A well-designed product will give you the    remote management necessary without creating additional    security problems, requiring specialist knowledge or adding    expense to the project.  <\/p>\n<p>    Why is this important?  <\/p>\n<p>    Being able to quickly vary security policy, encryption keys,    features and operation of endpoint encryption remotely, means    that your default policy can be strong and tight. Exceptions    can be made only when and where they are needed, and reverted    just as easily. If you can't do this you'll be forced to leave    'a key under the doormat' - just in case, tearing holes in your    policy before deployment is complete.  <\/p>\n<p>    3.Does the    solution allow you to remotely lock or wipe keys from    laptops?  <\/p>\n<p>    The answer might be crucial if a company computer with    full-disk encryption gets stolen while in sleep mode or with    operating system booted up, not to mention those systems with    the pre-boot password affixed on a label or tucked in the    laptop bag. If a remote lock or wipe function is not    available, then the system is either unprotected or secured    only by the OS password, with the encryption being bypassed in    either case.  <\/p>\n<p>    Similarly, it is important to know whether the solution has    been designed to accommodate the typical use-cases that would    otherwise unravel a well-designed security policy.  <\/p>\n<p>    4.Does the    solution secure removable media without having to whitelist    each item?  <\/p>\n<p>    With an array of writeable devices that people use for their    everyday work, it is almost impossible for the admins to    whitelist each and every one of them and decide if they can be    read from or written to.  <\/p>\n<p>    It is much easier to set a file-level policy--    distinguishing between files that need encryption and those    that don't-- and keep these protected every time they    move from workstation or corporate network to any portable    device.  <\/p>\n<p>    In other words, if you connect your own USB stick, it won't    force you to encrypt your private data, however anything coming    from the company system will be encrypted without the keys    being held on your device. A simple idea, but one which makes    any device safe, without the need for whitelisting.  <\/p>\n<p>    5.Is the    solution easy to deploy?  <\/p>\n<p>    If the setup of the solution takes hours or even days and needs    additional tools for its operation, it might cause new    headaches for company admins and create new security risks. Aim    for an easy-to-deploy solution that doesn't require advanced IT    expertise, preserving your finances as well as human    resources. If the user-experience mirrors that easy    deployment, then IT staff won't be further taxed by    user-lockouts, lost data and other frustrations.  <\/p>\n<p>    Closing remarks: The security was there a long time    ago; what will make or break your deployment is flexibility and    ease of use.  <\/p>\n<p>    All validated, commercial encryption products have been more    than strong enough for many years, yet a significant proportion    of the recorded data breaches involving lost or stolen laptops    and USB drives happened to organizations who had bought and    deployed encryption products. Reading the case notes for these    incidents reveals being able to fit the solution your    environment and working practices and making encryption easy    for everyday users as the real challenges.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/securitybrief.co.nz\/story\/eset-reveals-what-watch-out-you-buy-encryption\/\" title=\"ESET reveals what to watch out for before you buy encryption - SecurityBrief NZ\">ESET reveals what to watch out for before you buy encryption - SecurityBrief NZ<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Encryption services are becoming a focus for organisations and decision makers as new data protection laws such as the GDPR come in but when faced with a market flooded by various products and little time to make the right choice, it can be difficult to find the one that best fits individual needs, ESET says. The company has assembled a list of the five questions organisations should ask before buying encryption. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-33076","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33076"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=33076"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33076\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=33076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=33076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=33076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}