Back to Results
First PageMeta Content
Microsoft Windows / Software / Encrypting File System / BitLocker Drive Encryption / Data security / Filesystem-level encryption / Encryption software / Encryption / Password / Disk encryption / Cryptographic software / Cryptography


Defense in Depth: SPYRUS Solutions for Data at Rest and Data in Transit Disk Encryption vs. File Encryption, Software vs. Hardware Encryption, and Other Important Considerations In the year since a computer belonging to
Add to Reading List

Document Date: 2012-12-12 15:19:27


Open Document

File Size: 172,12 KB

Share Result on Facebook

Company

SPYRUS Inc. / Defense (DoD) Enterprise Software / Customs / the AES / DEA / SPYRUS Solutions / VeriSign / Border Patrol / The FBI / TSA / Microsoft / /

Country

United States / /

Event

FDA Phase / /

IndustryTerm

encryption software / storage devices / similar device / unconventional media / file encryption services / strength file encryption solution / removable media / cryptographic algorithm / legacy public key infrastructure / vetted encryption solutions / data-at-rest solution / supported devices / software-based file/folder encryption / authentication software / mobile computers/devices / removable mass storage device / hardware-based file encryption solution / portable device / capacity devices / encryption systems / Hardware processors / software encryption solutions / media players / Software defenses / secure file encryption device / fulldisk encryption solutions / disk-encryption software / bit encryption algorithm / encryption product / software-based disk / software-based file encryption solution / similar devices / removable mass storage class media / removable storage media / disk software encryption / software encryption / flash memory device / software-based file encryption systems / final solution / security device / law enforcement community / software components / encryption solution / removable devices / mobile computing devices / hardware device / exhaustive search / dedicated hardware processor / file encryption solutions / encryption products / certain law enforcement applications / simpler processors / cryption solutions / portable media players / hardware-based solution / hardware-based encryption solution / similar systems / movable media / encryption solutions / innocuous Web server / software programs / vulnerable media / particular removable media device / endpoint device / software vulnerabilities / hardware encryption device / internet temporary files / encryption algorithm / software solution / security devices / /

OperatingSystem

Windows Vista / Microsoft Windows / Microsoft Vista / Windows 2000 / /

Organization

office of Management and Budget / North Atlantic Treaty Organization / General Services Administration / Certification Authority / Federal Bureau of Investigation / Department of Defense / Veterans Administration / U.S. Small Business Administration / /

Position

Chief Information Officer / administrator / filter driver / Deputy Secretary / spy / Private / judge / Windows LAN Manager / /

Product

BitLocker / WinMagic SecureDoc Full Disk Encryption Solution / Talisman/DS / Talisman/DS Data Security suite / P-384 / Hydra PC™ / /

ProgrammingLanguage

Java / /

Technology

encryption algorithm / PKI / disk encryption / Hardware vs. Software Encryption / trial encryption / hardware encryption / laptop computer / smart card / operating system / TPM chip / Encryption / Cryptography / password-based encryption / The algorithms / Java / software-based file/folder encryption / file encryption / encryption system / cell phones / software encryption / digital signature / Hardware processors / dedicated hardware processor / Flash / 256 bit encryption algorithm / LAN / public key infrastructure / CPU chips / rest encryption / triple-DES algorithms / private key / same processor / SSL / operating systems / high-speed CPU chips / public key / flash memory / though password-based encryption / Mobile Computing / WinMagic SecureDoc disk encryption / digital cameras / File Sharing / Hydra PC Hardware File Encryption / Pentium-class processor / disk software encryption / Web server / /

URL

http /

SocialTag