Information Security Leader, Author, Instructor and Speaker

Data encryption methods: securing emerging endpoints

Posted on April 1, 2010 in Articles | by

These policies made it easy to feel secure about having your sensitive data left in vehicles, travelling through airports and sitting in computer bags in the homes of your employees — after all, if you encrypt every device, you don’t have to worry about what data may have been stored on a device after it was stolen. The technology certainly lies within the financial and technical reach of organizations of all sizes, as it easily scales from a small business to a large enterprise.

Read the full article: Data encryption methods: securing emerging endpoints

Published in SearchSecurity on 04/01/10

TAGS: ,

Leave a Reply

Your email address will not be published. Required fields are marked *