
Introduction
| 7
Introduction
Why Endpoint Encryption for Files and Folders?
Within all organizations there are people you trust with data and people you do not. At
a basic level most IT users are probably trusted to access their computers and use
their documents, but at a higher level – say at the board of directors, do you really
want your system administrators to be able to read sensitive reports and shareholder
information?
Endpoint Encryption for Files and Folders allows you and your administrators to define
data protection in a way that only certain users can read it. The encrypted data is
stored as normal files; it can therefore still be managed, archived, and distributed but
only understood by those who have been given proper access.
Endpoint Encryption for Files and Folders is a “Persistent Encryption” engine – once
you have encrypted a document, it’s not possible to mistakenly create a decrypted
copy of it. If you move a document out of an encrypted directory, it stays encrypted; if
you move it to a removable device such as a memory stick, it remains encrypted.
Endpoint Encryption for Files and Folders also follows the Endpoint Encryption Policy
control methods – your Administrators can set individual, department, group, or
companywide policies such as All .doc files will be encrypted, My Documents will
be encrypted, and Users cannot explicitly decrypt encrypted data. This policy
engine uses the award winning and long standing Endpoint Encryption Manager,
proven in customer installations worldwide.
Design Philosophy
Endpoint Encryption for Files and Folders enhances the information security by
providing data encryption and a strong authentication using, for example, a Smart
Card. You can use any login method, including passwords and national ID cards to
access protected information.
The intent of the product is to minimize user interaction related to information
protection. Thus, the degree of user interaction is subject to policy control. It is
possible for your Endpoint Encryption Administrators to set an environment where you
are not allowed to do anything at all. It’s also possible to allow you a wide range of
client side features. The amount of user involvement is subject to encryption policies,
which can be dynamically altered by your Endpoint Encryption Administrators as your
business needs change.
Kommentare zu diesen Handbüchern