FDE Performance Comparison. Hardware Versus Software Full Drive Encryption
|
|
|
- Collin Hutchinson
- 9 years ago
- Views:
Transcription
1 FDE Performance Comparison Hardware Versus Full Drive Encryption A look at performance and other differences between hardware based self-encrypting drives and software approaches to full disk encryption for laptops Trusted Strategies LLC Author: Bill Bosen January 5 th, 2010 Sponsored by Seagate Technology and Wave Systems Corp.
2 FDE Performance Comparison: Hardware vs. FDE According to recent studies, as many as 10% of laptop computers are lost or stolen each year, and most of them contain sensitive, confidential data 1. As a safeguard, many organizations are turning to FDE (Full Drive Encryption) as a means to protect their data from falling into the wrong hands. Since FDE technology encrypts everything on a PC or laptop s hard disk, security is greatly increased. However, because the operating system, applications, and data are all encrypted, FDE takes a tremendous amount of processing power. So the performance of any FDE product is critical when selecting a solution. With today s high speed CPUs, it s germane to ask how the performance of software based encryption systems compare with hardware based options. What kind of performance penalty might one expect if installing the various FDE technologies? When deployment and operational costs are factored into the equation, is it more cost effective to deploy hardware or software? To help answer these questions Trusted Strategies tested the performance of a number of FDE hardware and software products from industry leaders. Our objectives included determining the data throughput of commonly used applications like Microsoft office. We also wanted to test throughput for hard disk intensive procedures like system backups, virus scanning, and opening, reading, and writing large 100MB+ files used with data intensive applications. Finally, we wanted to know how encryption might effect the performance of disk heavy system processes such as startup, shutdown, and hibernation. s Tested For our FDE product testing, we chose three well known leaders in the software space, and the leading hard disk manufacturer: McAfee Endpoint Encryption for PC, version This is the former SafeBoot product and has been a leader in the software FDE industry for many years. McAfee acquired Safeboot in November 2007 and has since renamed it McAfee Endpoint Encryption. PGP Whole Disk Encryption for Windows, corporate desktop version, release PGP data encryption software was one of the first solution providers in the software FDE space, and according to the company s website is currently used by more than 110,000 enterprises. Microsoft Bitlocker, Windows Vista Ultimate, SP2. Bitlocker is included with the Ultimate and Enterprise editions of Microsoft Windows. Although BitLocker has only been around a few years, with Microsoft behind it, it s a force that can t be ignored and will certainly improve over time. 1 Ponemon Institute, 2006 and 2009 computer security surveys Business Risk of a Lost Laptop Performance Comparison: Hardware vs. Full Drive Encryption Page 2
3 Seagate Self-Encrypting Drives with Wave Systems Embassy Trusted Drive Manager: For the hardware based product tests, we chose Seagate Technologies self-encrypting drives. Seagate was the first disk drive manufacturers to enter the encrypting hard drive marketplace. We used the Seagate Momentus 7200 FDE model, a well known and respected drive. To manage the Seagate self-encrypting drive we used Wave System s EMBASSY Trust Suite software. EMBASSY enables and disables the drive s protected encryption mode, enrolls users, manages pre-boot user authentication and provides access to other unique drive features. The Seagate/Wave solution is shipped today by Dell as a factory integrated option and is the most widely distributed self-encrypting drive solution available. Since our objective was to compare the performance of software based FDE as a category instead of as individual products, we ve elected not to identify the performance benchmarks and scores of each specific software vendor. They are represented in the performance charts simply as 1, 2, and 3. Test Platforms and Procedures For our test platforms, we used identical Dell Latitude E6400 laptops, running Microsoft Windows Vista Ultimate, Service Pack 2. These 32 bit machines were equipped with Intel CoreTM 2 Duo Processors, and 2 GB of RAM. When testing the software FDE products, we used standard 500 GB 7200 RPM Seagate Momentus disk drives. For the hardware based FDE tests, we replaced the standard Seagate Momentus disk drives with Seagate s FDE / self-encrypting drives as noted above. Other than the encryption capabilities, the two drives are identical. We selected PCMark Vantage Professional edition to test and measure the throughput and performance of the different encryption solutions. We found the hard disk drive test suit exceptionally well designed for our needs, and while we ran performance tests on the entire system including the CPU, memory, and graphics, we concentrated on the hard disk drive test suite. Our test procedures including freshly imaging and restoring the operating system and applications on the Dell laptops before each and every specific test, and we repeated each of the tests at least three times. The results of the three different test sets were very consistent and similar, but to give the optimum score for each product we used the best result obtained in any of the tests. To establish a performance baseline, we first ran all of the tests on a newly imaged laptop that had no encryption enabled whatsoever, either in hardware or software. We then tested the performance of both hardware and software FDE products, and compared the results with the established performance baseline. Performance Comparison: Hardware vs. Full Drive Encryption Page 3
4 The specific tests conducted for each of the hardware and software solutions included the following: Application Loading: This test measured the data throughput from disk activities incurred by opening and closing the following applications - Microsoft Word, Adobe Acrobat Reader, Windows Media Player, Leadtek Winfast DVD, and Mozilla Internet Browser. The test involved 83% read operations and 17% write operations. Modest Size File Test: This test, consisting of 60% reads and 40% writes, measures disk activities of several common but modest size applications and files. Test activities included: o Opening a Microsoft Word document, performing grammar check, saving and closing o Compression and decompression using Winzip o Encrypting and decrypting files using PowerCrypt o Playing WAV, MP3, and WMV files with Windows Media Player o Playing a DivX video using DivX codec and Windows Media Player o Viewing pictures using Windows Picture Viewer o Browsing Internet files using Microsoft Internet Explorer o Loading, playing and exiting a game using Ubisoft Tom Clancy s Ghost Recon Extensive Data Read: Measures throughput while scanning 1.8GB of files for viruses. This test is 99.5% read activity. This test is also an effective way to test the performance of data backup procedures. Extensive Data Write: Measures throughput while writing 2GB of data on the hard disk. No read operations are involved in this test. System Startup: Elapsed time and hard disk throughput and activities that occur during Windows startup procedures. The test is 90% reading and 10% writes, and contains no user activity. System Shutdown: Measures how long it takes to perform a system shutdown. Hibernation Time Measures how long it takes for the system to hibernate and power back up. Microsoft Word, PowerPoint, and Outlook were running, with 106MB of data loaded Performance Results: Table 1 Our first set of tests measured data throughput during system startup. As one might expect during system boot, hard disk activity during these tests was around 90% reads and 10% write activity. Since the startup procedures open a large number of relatively small files, system overhead and the associated processing tends to be the performance limiting factor or bottleneck, not encryption/decryption of the files. That being the case, the performance throughput across all five systems we tested, including the nonencrypting platform, was virtually identical. The difference in throughput between the fastest encrypting platform, the Seagate self-encrypting drive at 7.99 MB per second, and Performance Comparison: Hardware vs. Full Drive Encryption Page 4
5 the slowest platform, one of the software products at 7.53 MB per second, was.46mb per second. Although measurable, this difference is not humanly detectable when starting up the system. We had similar results when testing the throughput during typical, smaller sized application loading. The applications we used during these tests were common programs like Microsoft Word, Adobe Acrobat, and Internet browsers. These were all relatively small sized file operations when compared with the larger files we tested later. The difference in throughput between the various platforms for loading small applications was essentially not detectable. The same can be said of our throughput tests for reading and writing modest sized data files. The slowest software encryption product throughput was only.18mb per second behind the Seagate self-encrypting drive. Full Disk Encryption Throughput Tests Table 1 No Encryption Seagate Self- Encrypting Drive Encryption Average Startup Throughput (MB/second) Application Loading (MB/second) Modest Size File Test (MB/second) Extensive Data Read (MB/second) Extensive Data Write (MB/second) Our next test measured data throughput during extensive read operations like those performed during virus scanning, copying a large amount of data or when backing up the system. Here we saw huge differences in performance, the throughput of the software encryption products proved to be no match for the self-encrypting drives No Encryption Extensive File Read Test (MB/second) Seagate SED Average Prod Prod Prod. 3 At MB per second, the selfencrypting drives with their built in hardware encryption engine performed equally as well as standard disk drives, and 114% faster than the average of the three software encryption solutions we tested. The fastest software solution had a throughput of MB per second. However, the Seagate self-encrypting drive was 79% faster than the quickest software product, 132% faster than the next, and 144% faster than the slowest software based solution. Performance Comparison: Hardware vs. Full Drive Encryption Page 5
6 No Encryption Extensive File Write Test (MB/second) Seagate SED Average Prod Prod Prod. 3 Our extensive file write performance tests also showed hardware encryption significantly outperforming software based encryption. Here again, the Seagate self-encrypting drive proved to be identical in performance throughput with the standard drive, and 43% faster than the average of the three software based solutions. Next we turned our attention to the effect full disk encryption has on the time it takes to perform system startups, shutdown, and hibernation functions. As you can see from the table below, full disk encryption had little effect on system shutdown time, with the exception of one software product, which for some reason adds around 17 seconds to the time required to shut the system down. Likewise, full disk encryption had little effect on the time it takes to hibernate. Although one software solution we tested added about 6 seconds, which most users won t find too annoying, the other products had very little effect on the time it takes to hibernate. Recovering from a hibernation state is a different story. On average, the software solutions took nearly twice as long to recover from hibernation as the hardware based self-encrypting drives from Seagate, adding around 17 seconds. Wave Systems pre-boot unlock of the self-encrypting drive took less than 3 seconds. Full Disk Encryption System Startup/Shutdown Effect Tests Table 2 No Encryption Seagate Self- Encrypting Drive Encryption Average Startup Time (seconds) Shutdown Time (seconds) Hibernate Time (seconds) Hibernate Recover Time (seconds) Security, Implementation, and other Issues While performance is a very important factor when selecting a full disk encryption solution, there are a number of other chief considerations. The relative security of the various technologies can be crucial for many organizations. Additionally, the time it takes to install and deploy a full disk encryption solution can be very significant, especially if hundreds or even thousands of PCs are involved. Our tests and experience with these products led us to some notable observations. Performance Comparison: Hardware vs. Full Drive Encryption Page 6
7 based encryption takes hours to install One major observation was that software based encryption takes literally hours to install. Our first software product install took us about 25 minutes to get it installed and configured, not counting the process that encrypts the disk the first time. We did subsequent installs and configurations in about 12 minutes. However, all of the software products are time consuming to install, even after you have them mastered. One product did however, once the central policies were configured and set up, create very nice installation sets for the laptops. Although still time consuming, there were no difficult configurations or decisions to make during the end user machine installs. The most serious deployment issue however is the actual time software solutions take to encrypt the disk the first time. Each of the software products, once installed and configured, encrypt all of the data on the disk. In the slowest products case, it took 23 hours and 46 minutes to complete the encryption on our 500 GB drives. This product offers two encryption options, one that is faster but won t guarantee system integrity if a power failure or abnormality occurs, or the slower, safer mode. We chose the latter as we believe most users or organizations would. Another software based product took 8 hours and 9 minutes to encrypt the 500 GB drive. The company s technical support staff told us to expect about 1 hour of encryption time for every 40GB of data. Using that formula we expected it to take us 12 and ½ hours, but it actually finished in just over 8 hours. The fastest software product completed the task in 3 hours and 16 minutes. All of the software products do the encryption completely in the background, so users can keep working and even power down their machine before the drive is fully encrypted. When the system is restarted, the background encryption process picks up where it left off and keeps right on encrypting until it is done. This is a nice feature, however until the encryption is complete the system s performance is seriously slowed. So doing anything that requires heavy file usage or processing power during the lengthy initial encryption of the drive can be painfully slow. After all is said and done, not counting the time it takes to completely backup a system as recommended prior to installation, it took us anywhere from 3 ½ to 24 hours to finish the installation and initial encryption process for software based FDE products. This is very different than when using a hardware approach such as a self-encrypting drive from Seagate. Since self-encrypting drives always automatically encrypts anything written to it, the operating system, applications, or any data on the drive is already encrypted as soon as it s stored on the drive. There is no need to perform the initial encryption process that software packages require. Apart from setting security policies and the key management that s necessary for every approach, the only requirement to start using a self-encrypting drive in a secure mode is to enroll authorized users, which only takes a minute or two utilizing the Wave Systems Trusted Drive Manager software. Performance Comparison: Hardware vs. Full Drive Encryption Page 7
8 It s scary to scramble everything on your hard disk Another observation we experienced first hand is that it s scary to scramble everything on your hard disk. Even though we grew to be relatively comfortable with the robustness of the software encryption packages, the first few times we committed our laptops to the initial encryption process was frightening. Even though a user or administrator may have backed up their data, the thought of having something go wrong and having to restore the operating system and applications is not something users want to experience (we did have one installation that corrupted Microsoft Office and it had to be reinstalled). It s natural for users to resist the installation of software based encryption, especially those experiencing it the first time. This just isn t an issue when hardware based encryption is used. There s nothing that requires scrambling or encrypting by the operating system or an application because the drive hardware automatically encrypted everything as it was written to the disk. Advantages of Hardware Security While a detailed review of the security of the various FDE products was beyond the scope of this study, we felt it pertinent to comment on the generally accepted advantages of hardware based security over technologies that rely on software alone. One of the primary drivers for laptop encryption today is to provide compliance to the various data protection laws. Unless an organization can prove that all personal or private data residing on a lost or stolen disk is securely encrypted, these laws require that, all potential victims must be notified of the possible loss of their information. Some software based FDE solutions do a reasonable job in reporting a complete installation, and in preventing end users from removing or bypassing the data encryption on their laptops and can thus prove compliance. The extent of such controls depends of course on the specific security policies and implementation. But it is possible for some of the product s central management systems to provide reasonable proof that a given laptop s hard disk was encrypted at the time of a theft or loss. However, not all of the software based solutions can do this. Some systems can t prove that a specific laptop s disk was ever encrypted, or that it is still being encrypted. For instance, we could find no controls in one of the software products that would prevent the end user from disabling or removing the encryption if they desired. Given the degradation in performance of software FDE, some users may elect to remove the encryption. Since the performance of the Seagate self-encrypting drives we tested was as good as a standard drive, there is simply no incentive for users to remove or bypass the encryption, even if it were possible. Wave System s Embassy Remote Administration Server provides full audit logs of the security settings for all centrally managed self-encrypting drives for use to provide compliance to data protection laws in the event of a lost or stolen laptop. When centrally managed, Wave s client software disables all local changes to the security settings in order to maintain the integrity of the centralized audit logs Another advantage of hardware based security is the protection of the authentication and encryption keys. By design self-encrypting drives do all of the cryptography within the disk drive controller, and unlike software FDE, the disk encryption keys are not present in the computer s CPU or memory where they are subject to theft. Likewise, authentication of Performance Comparison: Hardware vs. Full Drive Encryption Page 8
9 authorized user credentials is done within the protected hardware of the drive and never exposed within the memory or OS of the PC. Additionally the strength of the shadow master boot record approach used by self-encrypting drives is that the pre-boot code is highly protected and is not resident with the OS at any time. So OS attacks can t generally be used against a self-encrypting drive s pre-boot process. Summary Any type of full disk encryption is better than no encryption at all, but the performance advantages of self-encrypting disk drives, particularly when reading or writing large amounts of data is very compelling. The self-encrypting Seagate drive we used for these tests was as fast as a standard drive, and handled large file operations better than twice as fast as the software approaches to full disk encryption. The Wave System s self-encrypting drive management software provided access to the full range of the drive s features and security settings, including initialization of the pre-boot code and assigning users to the drive. Another advantage of using laptops equipped with self-encrypting drives is the savings in time it takes to deploy the system. It s not necessary to initially encrypt the contents of the hard disk like software solutions require, a process that took us anywhere from 3 ½ hours to 24 hours per laptop. Organizations struggling to decide if it is more cost effective to use software solutions to encrypt existing laptops, or to upgrade to new laptops equipped with self-encrypting drives need to carefully consider the time involved and loss of performance when deploying software solutions. Another factor in the total cost of ownership for data protection is that self-encrypting drives and the associated management drive software are being factory integrated by the PC OEMs as a primary security feature of the PC. For example, Dell currently offers Seagate selfencrypting drives and Wave s Embassy software as factory integrated features in their platforms. This provides enterprises with a single point of support, a pretested solution, and a stronger security model for the platform rather than adding encryption as a separate, aftermarket software package. About Trusted Strategies Trusted Strategies is the premier advisory, consulting, and market intelligence firm focused solely on the information technology (IT) security industry. Offering a unique, business-oriented perspective, Trusted Strategies provides accurate, expert, and concise market research and consulting for setting strategy and building business. Trusted Strategies is privately held, and located in Pleasanton Calif. Trusted Strategies LLC Pleasanton, CA (925) Performance Comparison: Hardware vs. Full Drive Encryption Page 9
Full Drive Encryption with Samsung Solid State Drives
Full Drive with Solid State Drives A performance and general review of s new selfencrypting solid state drives. Trusted Strategies LLC Author: Bill Bosen November 2010 Sponsored by Electronics Full Drive
Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems
Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems Built-in Security to Protect Sensitive Data without Sacrificing Performance What is an SED? A self-encrypting drive performs
Hard Disk Drive vs. Kingston SSDNow V+ 200 Series 240GB: Comparative Test
Hard Disk Drive vs. Kingston Now V+ 200 Series 240GB: Comparative Test Contents Hard Disk Drive vs. Kingston Now V+ 200 Series 240GB: Comparative Test... 1 Hard Disk Drive vs. Solid State Drive: Comparative
Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer
Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer The Data Breach Epidemic Continues.. 1 Data Encryption Choices for Businesses................... 2 The Hardware
Yale Software Library
e/ Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 432-9000 or [email protected] Installation PGP Desktop for Windows Operating Systems Preparing your computer:
Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest
Full Disk Encryption Drives & Management Software The Ultimate Security Solution For Data At Rest Agenda Introduction Information Security Challenges Dell Simplifies Security Trusted Drive Technology Seagate
Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.
Factory-Installed, Standards-Based Hardware Security Steven K. Sprague President & CEO, Wave Systems Corp. The challenge We are having a little problem with identity and data theft. It is time to reduce
Trusted Computing Basics: Self-Encrypting Drives
09/21/2011 Trusted Computing Basics: Self-Encrypting Drives Ryan C. Getek, Ph.D. CISSP-ISSEP Secure Storage Lead, Trusted Computing Division, NCSC Jason Cox Client Security Products Lead, Seagate Technology
Diskeeper and Disk Encryption
Diskeeper and Disk Encryption OVERVIEW In the early 1990s, Diskeeper Corporation (a Microsoft Gold Partner) and Microsoft co-wrote Windows kernel-level code, and exposed an API (Application Programming
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
SSD Old System vs HDD New
SSD technology enjoys many advantages over traditional spinning disk / s. No moving parts makes it more rugged, more resistant to shock and vibration but performance is undoubtedly the biggest benefit
1. System Requirements
BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
Understanding the Performance of an X550 11-User Environment
Understanding the Performance of an X550 11-User Environment Overview NComputing's desktop virtualization technology enables significantly lower computing costs by letting multiple users share a single
Setting up for Adobe Connect meetings
Setting up for Adobe Connect meetings When preparing to lead a live lecture or meeting, you probably ensure that your meeting room and materials are ready before your participants arrive. You run through
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Samsung SED Security in Collaboration with Wave Systems
Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
Windows 7. Qing Liu [email protected] Michael Stevens [email protected]
Windows 7 Qing Liu [email protected] Michael Stevens [email protected] 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes
Introducing Intel Small Business Advantage
Introducing Intel Small Business Advantage. 2nd Gen Intel Core processors with Intel Small Business Advantage deliver enhanced productivity and security 24/7 for small businesses1 1 The Small Business
Kaspersky Lab s Full Disk Encryption Technology
Kaspersky Lab s Full Disk Encryption Technology In the US alone, an estimated 12,000 laptops are lost or stolen each week. According to the Ponemon Institute, a laptop is stolen every 53 seconds; more
AP ENPS ANYWHERE. Hardware and software requirements
AP ENPS ANYWHERE Hardware and software requirements Contents Server requirements 3 Hard drives 5 Virtual machines 6 AP ENPS mobile server 6 Client requirements 7 AP ENPS client on a Mac-based computer
CBE Architectural Overview and System Requirements
CBE Architectural Overview and System Requirements January 2015 ARCHITECTURAL OVERVIEW ARCHITECTURAL OVERVIEW EXAMPLE OF CBE SOFTWARE INSTALLATION The following diagram shows the users, programs in use
Installing and Upgrading to Windows 7
Installing and Upgrading to Windows 7 Before you can install Windows 7 or upgrade to it, you first need to decide which version of 7 you will use. Then, you should check the computer s hardware to make
Remote Deposit Capture Installation Guide
Remote Deposit Capture Installation Guide Please contact [email protected] or call 860-284-6549 with any questions. Remote Deposit Capture Installation Instructions It is necessary to
Symantec Endpoint Encryption Deployment Best Practices and Roadmap
Symantec Endpoint Encryption Deployment Best Practices and Roadmap Jon Allen Baylor University Chief Information Security Officer & Assistant Vice President Rene Kolga Symantec Principle Product Manager
Encryption as a Cloud Service provides the lowest TCO
Encryption as a Cloud Service provides the lowest TCO Alertsec offer Full Disk Encryption at half the total cost of ownership of on-premise solutions Contents Executive Summary... 3 The Costs of Encryption...
DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering
DELL Virtual Desktop Infrastructure Study END-TO-END COMPUTING Dell Enterprise Solutions Engineering 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL
Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution
April 2013 Page 1 Protect your plant data with the solution. Best-in-class offering Easy-to-use solution Data protection and disaster recovery in a single solution Scalable architecture and functionality
Allstate Insurance Company s Local Data Protection (LDP) Project
Allstate Insurance Company s Local Data Protection (LDP) Project A Case Study Laptop Encryption Eric V. Leighninger Chief Security Architect Allstate Insurance Company PD1 Agenda Allstate and information
How to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
VMware Horizon FLEX User Guide
Horizon FLEX 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Cautions When Using BitLocker Drive Encryption on PRIMERGY
Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance
Installing and Upgrading to Windows XP
Installing and Upgrading to Windows XP Although Windows XP was released many years ago, you will still see it in the field and might need to install it as well, or upgrade older Windows computers to XP.
White Paper: Whole Disk Encryption
How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................
Management of Hardware Passwords in Think PCs.
Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction
NEC Virtual PC Center (VPCC) Product and Technology Overview
NEC Virtual PC Center (VPCC) Product and Technology Overview Virtual PC Center is NEC s complete software solution to deploy and manage virtual desktop users throughout your entire organization. It is
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
Performance Test Report: Novell iprint Appliance 1.1
White Paper File and Networking Services Performance Test Report: Novell iprint Appliance. Table of Contents page Executive Summary.... Introduction.... Overview... 3. Configurable Test Variables...3 4.
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
User Manual. Copyright Rogev LTD
User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's
Server & Workstation Installation of Client Profiles for Windows
C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing
MedInformatix System Requirements
MedInformatix System Requirements Acentec, Inc. A MedInformatix installation requires a workstation for each user who will access the system and a central server to store and process the data. A large
McAfee Endpoint Encryption (SafeBoot) User Documentation
TABLE OF CONTENTS Press the CTRL key while clicking on topic to go straight to the topic in this document. I. Introduction... 1 II. Installation Process Overview... 1 III. Checking for a Valid Current
Symantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do
Windows Embedded 7 E versus Windows Embedded 7 P
Windows Embedded 7 E versus Windows Embedded 7 P Applications and Services Development.Net Framework.Net Framework 3.5 SP1.NET Framework 2.0 Client Profile.NET Framework 3.0.NET Framework 3.0 Client Profile.NET
Symantec Drive Encryption for Windows
Symantec Drive Encryption for Windows Technical Note 10.3 Released January 2014. Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo,
Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
Deployment Planning Guide
Deployment Planning Guide August 2011 Copyright: 2011, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form or by any means,
Citrix EdgeSight Installation Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3
Citrix EdgeSight Installation Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
Commercially Proven Trusted Computing Solutions RSA 2010
Commercially Proven Trusted Computing Solutions RSA 2010 Hardware Self-Encrypting Drives (SEDs) Unique Security Features Encryption below the file system Hardware root-of-trust for encryption Tamper resistant
Virtualization and Windows 7
9 Chapter Virtualization and Windows 7 Information in this Chapter Windows XP Mode Many Forms of Virtualization Summary Windows Virtual PC is an optional component of Windows 7 Professional, Enterprise,
QUESTIONS & ANSWERS. ItB tender 72-09: IT Equipment. Elections Project
QUESTIONS & ANSWERS ItB tender 72-09: IT Equipment. Elections Project In lot 1, position 1 - Server for Data Base 1. Q: You order Microsoft Windows Server 2008, 64 bit, Enterprise, License with 25 or more
Sage Grant Management System Requirements
Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to
McAfee Endpoint Encryption for Files and Folders. Best Practices. For EEFF product version 4.0.0
McAfee Endpoint Encryption for Files and Folders Best Practices For EEFF product version 4.0.0 McAfee, Inc. McAfee, Inc., 2821 Mission College Blvd., Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 Internet:
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7
HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7 September 15, 2009 Introduction HP is committed to supporting our customer s operating
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
Verizon Security Scan Powered by McAfee. Installation Guide for Home Users
Verizon Security Scan Powered by McAfee Installation Guide for Home Users ii Contents Introduction 3 System requirements 5 Installing Security Scan 7 Downloading your software... 7 Download your software...
Backup Exec System Recovery Management Solution 2010 FAQ
Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation
Microsoft Office 2010 system requirements
Microsoft Office 2010 system requirements When upgrading from Microsoft Office 2007 to the 2010 release you should not need to upgrade your hardware, although you might need to upgrade to a supported operating
Windows Server Performance Monitoring
Spot server problems before they are noticed The system s really slow today! How often have you heard that? Finding the solution isn t so easy. The obvious questions to ask are why is it running slowly
PC Power Management FAQ
PC Power Management FAQ What is Verismic Power Manager? Verismic Power Manager is a powerful web- based PC Power Management Software that enables people to benefit from the carbon and energy savings that
Reform PDC Document Workflow Solution Streamline capture and distribution. intuitive. lexible. mobile
Reform PDC Document Workflow Solution Streamline capture and distribution intuitive lexible mobile Reform PDC Innovation and convenience to maximize efficiency. Your organization is unique so is its document
INTRODUCTION TO WINDOWS 7
INTRODUCTION TO WINDOWS 7 Windows 7 Editions There are six different Windows 7 editions: Starter Home Basic Home Premium Professional Enterprise Ultimate Starter Windows 7 Starter edition does not support
Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide
Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide Product version: 5.60 Document date: April 2011 Contents 1 Introduction...3 2 Requirements...5 3 The demo configuration package...6 4
Maintaining a Microsoft Windows Server 2003 Environment
Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.
InventoryControl for use with QuoteWerks Quick Start Guide
InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY
Delphi+ System Requirements
Delphi+ System Requirements Revision 1.1 Newmarket International, Inc. October 24, 2013 Delphi+ System Requirements Users Up to 15 Up to 25 Up to 50 Up to 90 Up to 200 Over 200 Minimum 2008 Server Hardware
Distribution One Server Requirements
Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
GUARD1 PLUS SE Administrator's Manual
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 [email protected] www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.
Technical Note Installing Micron SEDs in Windows 8 and 10 TN-FD-28: Installing Micron SEDs in Windows 8 and 10 Introduction Introduction Self-encrypting drives (SEDs) can provide an effective way of protecting
Chapter 12: Windows XP, Vista, and 7
Chapter 12: Windows XP, Vista, and 7 Complete CompTIA A+ Guide to PCs, 6e To distinguish between the Windows XP, Vista, and 7 operating systems To install, configure, and troubleshoot Windows XP, Vista,
How Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
How To Choose Help Desk Software For Your Company
With hundreds of Help Desk software packages available, how do you choose the best one for your company? When conducting an Internet search, how do you wade through the overwhelming results? The answer
Samsung Magician v.4.5 Introduction and Installation Guide
Samsung Magician v.4.5 Introduction and Installation Guide 1 Legal Disclaimer SAMSUNG ELECTRONICS RESERVES THE RIGHT TO CHANGE PRODUCTS, INFORMATION AND SPECIFICATIONS WITHOUT NOTICE. Products and specifications
Is your business still wasting time and money on PCs and Servers?
Hosted Managed Desktop Cloud Computing Is your business still wasting time and money on PCs and Servers? Our service is a cheaper and simpler alternative to owning and managing your own business IT network.
Windows Server 2008 R2 Essentials
Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution
BitLocker Encryption for non-tpm laptops
BitLocker Encryption for non-tpm laptops Contents 1.0 Introduction... 2 2.0 What is a TPM?... 2 3.0 Users of non-tpm University laptops... 2 3.1 Existing Windows 7 laptop users... 2 3.2 Existing Windows
User Guide. Windows 8 Upgrade Assistant. Laplink Software, Inc. MN-PCM-UpgdAssist-EN-08 (REV. 10/2012)
1 Windows 8 Upgrade Assistant User Guide Laplink Software, Inc. For technical support issues or questions, please visit: http://www.laplink.com/contact For other inquiries, please see contact details below:
Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools
Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd. www.cryptomill.com
SEAhawk CryptoMill CryptoMill Technologies Ltd. www.cryptomill.com OVERVIEW S EAhawk is an endpoint and removable storage security solution for desktop PCs and laptops running the Microsoft Windows operating
