Storage

03:59 AM
Connect Directly
RSS
E-Mail
50%
50%

Laptop Encryption the Service Way

Not into building your own laptop encryption? New services should help

Laptops are becoming a a leading cause of gastric disturbance to IT managers worldwide. High-profile thefts, electronic eavesdroppers, and general lack of security, paired with workers' increasing mobility, is serving up a witches brew that can poison corporate security. What's more, a technical antidote can be annoyingly tough to implement. (See Portable Problems Prompt IT Spending and Laptop Venn & Zen.)

But what if you didn't have to do it yourself? What if you could just phone for help? That's the premise behind emerging encryption services for mobile workers, as typified by today's news that Fiberlink Communications Corp. has teamed up with Credant, a vendor of mobile-device security software, to offer services nationwide.

According to Fiberlink, all a manager has to do is lift that phone. Once an enterprise signs a contract, Fiberlink lets IT tap into its Extend360 Mobility platform through the Internet. The Fiberlink software interacts with the company's LDAP directory to establish a profile, and a human agent at Fiberlink confers with the IT department to determine encryption policies for specific users and groups of users.

All that remains is for the end user to get on the Internet to download Fiberlink's agent. (Agent software can also be distributed in a variety of other ways, but the Internet is preferred by Fiberlink.) Encryption automatically takes place when the user is obtaining data online. Fiberlink customers don't have to use their Internet transport, either -- any Internet service a laptop user deploys will be encrypted.

There is a catch -- several, in fact. First, while data accessed from corporate resources like databases is automatically encrypted, laptop users must use a password each time they want to encrypt email. As every IT manager knows, relying on end users this way is part of the laptop problem.

Previous
1 of 3
Next
Comment  | 
Print  | 
More Insights
Hot Topics
15
3 Signs You're Overspending On Data Storage
John Morris, President and CEO, Cleversafe,  7/24/2014
11
Fall IT Events: On The Road Again With 10 Top Picks
James M. Connolly, Editor in Chief, The Enterprise Cloud Site,  7/29/2014
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
Video
Slideshows
Twitter Feed