Venafi Rolls Out Client Encryption Manager
Venafi expands systems management capabilities of Microsoft Encrypting File System for comprehensive data protection
September 24, 2007
SANDY, Utah -- Venafi, a leading provider of systems management for encryption, today announced its Client Encryption Manager(CEM) for the Windows Encrypting File System (EFS). CEM provides centralized automated configuration and management capabilities to give organizations deploying EFS in enterprise environments a lower-cost alternative to expensive and complex 3rd party full disk encryption systems. CEM will help companies utilize their investment in Microsoft technology to more cost-effectively protect client data while better enabling a seamless migration to Windows Vista with its BitLocker Drive Encryption solution a full disk encryption data-protection feature available in the Windows Vista Enterprise and Ultimate editions.
"With Windows Vista and BitLocker encryption on the enterprise deployment horizon, organizations considering proprietary full disk encryption tools should assess whether these 3rd party tools still make sense," said Jon Oltsik, senior analyst at Enterprise Strategy Group. "Perhaps a more prudent approach in the meantime would be to configure and manage the security features that are already available in Windows XP and Windows 2000 in a way that meets necessary safe harbor requirements, and also enable a more straightforward Vista migration. Venafi Client Encryption Manager is an encryption management solution that may help organizations bridge this gap."[jaa2] <#_msocom_2>
According to Trell Rohovit, president and CEO, Venafi, ³We believe utilizing functionality in the operating system is a much better IT governance strategy than buying expensive and hard to manage proprietary 3rd party disk encryption systems that supersede the operating system. Our customers successfully leverage EFS today to protect their most critical assets and can easily bridge to Windows Vista BitLocker to gain full advantage of both file-based and full-volume encryption functionality.²
You May Also Like