Encrypting Sensitive Data

01/07/2009 White Paper

Tech Outlook article written by Susan Purcell and TCG member Lark Allen, which was published in Mortgage Technology’s July 2009 issue.

Tough data protection and privacy laws are making full disk encryption of all data on laptops and other devices mandatory. The cost of the average data breach in 2008 rose to more than $6.6 million per incident, according to Ponemon Institute LLC’s 2008 Annual Study: Cost of a Data Breach. In addition, the violating business is frequently flogged in the press. The storage industry has responded with a new generation of industry standard Self-Encrypting Drives. These new “trusted” drives are designed to be “set it and forget it” while providing better security, higher performance and lower cost than the traditional software for doing full disk encryption. To better assure legal compliance, Self-Encrypting Drives provide the industry’s best solution for data protection and should be a standard feature in all new laptops.

Article available for download: Encrypting Sensitive Data

Tech Outlook article written by Susan Purcell and TCG member Lark Allen, which was published in Mortgage Technology’s July 2009 issue.

Tough data protection and privacy laws are making full disk encryption of all data on laptops and other devices mandatory. The cost of the average data breach in 2008 rose to more than $6.6 million per incident, according to Ponemon Institute LLC’s 2008 Annual Study: Cost of a Data Breach. In addition, the violating business is frequently flogged in the press. The storage industry has responded with a new generation of industry standard Self-Encrypting Drives. These new “trusted” drives are designed to be “set it and forget it” while providing better security, higher performance and lower cost than the traditional software for doing full disk encryption. To better assure legal compliance, Self-Encrypting Drives provide the industry’s best solution for data protection and should be a standard feature in all new laptops.

Article available for download: Encrypting Sensitive Data