Yeah that too...
Z
Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org
-Original Message-
From: David Lum [mailto:david@nwea.org]
Sent: Friday, December 21, 2012 4:01 PM
To: NT System Admin Issues
Subject: RE: Disk encryption
Subject: Re: Disk encryption killer: Anyone see this?
On Fri, Dec 21, 2012 at 7:20 PM, Ken Schaefer k...@adopenstatic.com wrote:
Another option would be to trick the user into installing this
software, or trick the user into somehow giving away access to the
machine (aka these APTs we keep
Good point.
(Although I bet stealing the laptop would be prone to being
uncovered, too. ;-)
(Yes, I get that it's before vs after the data theft. :) ) )
On Sun, Dec 23, 2012 at 7:03 AM, Ken Schaefer k...@adopenstatic.com wrote:
Do you mean, snag the clear-text version of the user's
Don't steal the laptop. :) Break into the room - clone the drive, leave the
laptop in place. Use the exfiltrated encryption key to decrypt the cloned disk
at your leisure.
-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com]
Sent: Monday, 24 December 2012 3:37 AM
To: NT
can do that, why bother with trying to attack the
encryption? Just wait for the user to use it, and snag the cleartext
version. :)
-- Ben
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
---
To manage subscriptions
Oh, great. I wonder what view CMS will take if a laptop is stolen\lost and
it's encrypted. Will they still say it's a HIPAA violation?
From: David Lum [mailto:david@nwea.org]
Sent: Friday, December 21, 2012 12:29 PM
To: NT System Admin Issues
Subject: Disk encryption killer: Anyone see
Yes and Pgpcrack also is another tool to crack PGP encryption.
Z
Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org
From: David Lum [mailto:david@nwea.org]
Sent: Friday, December 21, 2012 12:29 PM
To: NT System Admin
I would say off the record no, if you used popular encryption software
and a repeatable process, but when you lose physical security of an
asset, given a reasonable amount of time and effort the encryption will
be cracked and data will be obtained.
Z
Edward E. Ziots, CISSP, Security
This tool seems to have some serious caveats, like you have to have access
to a running system and it's memory dump.
On Fri, Dec 21, 2012 at 9:57 AM, Ziots, Edward ezi...@lifespan.org wrote:
I would say off the record no, if you used popular encryption software and
a repeatable process
I'm no security expert.
But I do assume that if the physical machine is compromised, then the data it
holds is as good as compromised as well, no matter what level of encryption you
have.
--Matt Ross
Ephrata School District
- Original Message -
From: Ziots, Edward
[mailto:ezi
I don't find this alarming at all: it requires access to the key data,
and is useful if you have a memory dump or a cleartext hibernation
file (hiberfil.sys is going to be *encrypted* on a hibernating machine
with whole-disk encryption). This tool appears to be a good
time-saver, given a memory
,
and is useful if you have a memory dump or a cleartext hibernation
file (hiberfil.sys is going to be *encrypted* on a hibernating machine
with whole-disk encryption). This tool appears to be a good
time-saver, given a memory dump, because it knows where to look in for
the keys and how to extract them
to be *encrypted* on a hibernating machine
with whole-disk encryption). This tool appears to be a good
time-saver, given a memory dump, because it knows where to look in for
the keys and how to extract them, but it does not attack any inherent
cryptographic weakness or key management problems
On Fri, Dec 21, 2012 at 2:38 PM, Andrew S. Baker asbz...@gmail.com wrote:
You could unlock my safe if I gave you the keys as well, which is all that is
happening here.
Even the bit about using the hibernation file is not worthy of the headline
they provided...
It's not like they're
Sensationalist tech press is sensational?
On Fri, Dec 21, 2012 at 2:47 PM, Ben Scott mailvor...@gmail.com wrote:
On Fri, Dec 21, 2012 at 2:38 PM, Andrew S. Baker asbz...@gmail.com
wrote:
You could unlock my safe if I gave you the keys as well, which is all
that is happening here.
Even
So I'm hearing we shouldn't be concerned about a PGP-encrypted laptop *unless*
it's hibernation file is unencrypted (read, no full disk encryption)? A fully
encrypted disk that has a screen saver password is going to be pretty secure?
You'll thus need to get a memory dump from a running PC
Message-
From: David Lum [mailto:david@nwea.org]
Sent: Friday, December 21, 2012 3:39 PM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
So I'm hearing we shouldn't be concerned about a PGP-encrypted laptop
*unless* it's hibernation file is unencrypted (read
Simple to get past the screensaver password then?
-Original Message-
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Friday, December 21, 2012 12:59 PM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
Its not hard to get a memory dump from a PC
the screensaver password then?
-Original Message-
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Friday, December 21, 2012 12:59 PM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
Its not hard to get a memory dump from a PC that is running, and you have
: David Lum [mailto:david@nwea.org]
Sent: Saturday, 22 December 2012 7:39 AM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
So I'm hearing we shouldn't be concerned about a PGP-encrypted laptop *unless*
it's hibernation file is unencrypted (read, no full disk
encryption... 30 million users.
Zix Corporation (ZixCorp), (NASDAQ-NMS: ZIXI), the leader in email
encryption services, has announced that ZixDirectory(r), its shared
email encryption network, has registered its 30 millionth member.
Growing at approximately 100,000 members per week
Also a 2 year Zix user here. We looked at encryption solutions from Sophos and
Barracuda and could compare to Zix . As Paul stated, setup and maintenance is
easy and I've have found Zix support to be top notch. I am not familiar with
the McAffee offering.
Steve
- Original Message
(845) 757-4000
http://www.webjogger.net http://www.webjogger.net/
On 11/28/2012 2:47 PM, chipsh...@comcast.net wrote:
Also a 2 year Zix user here. We looked at encryption solutions from
Sophos and Barracuda and could compare to Zix. As Paul stated, setup
and maintenance is easy and I've have
that Kerberos and Server Certificate is being used.
The security layer is set to SSL (TLS1.0) and the Encryption Level is
set to FIPS compliant and I set the security option use FIPS compliant
Algorithms for Encryption Signing and Hashing.
I have a call in with M$ on this just to verify
...@lifespan.org
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Friday, July 13, 2012 7:43 AM
To: NT System Admin Issues
Subject: RE: Encryption of RDP via Certificates
Yep just did that, and it shows that the access is authenticated via
certificate, but when I do a sniff
Just use the web server certificate.
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Thursday, July 12, 2012 2:57 PM
To: NT System Admin Issues
Subject: Encryption of RDP via Certificates
If anyone has successfully done this and knows which Certificate Template in
Microsoft CA to utilize
.
--Steve
On Thu, Jul 12, 2012 at 8:36 PM, Michael B. Smith mich...@smithcons.comwrote:
Just use the web server certificate.
** **
*From:* Ziots, Edward [mailto:ezi...@lifespan.org]
*Sent:* Thursday, July 12, 2012 2:57 PM
*To:* NT System Admin Issues
*Subject:* Encryption of RDP via
To the list,
For everyone that is using SSL encryption for your RDP communications,
are you setting your encryption strengths to FIPS 140-1 Compliance in
Win2k8R2 and SSL (TLS 1.0). Also does anyone have a valid packet capture
to ensure that the traffic is really being encrypted. I just set
Not sure what you mean by not seeing TLS traffic - how are you verifying
this?
FIPS compliant encryption is possible (using it). Found this article that
may help troubleshoot your situation:
http://blogs.msdn.com/b/openspecification/archive/2011/12/08/encryption-nego
tiation-in-rdp
Organization
ezi...@lifespan.org
From: hotmail_b243df4f33245...@live.com
[mailto:hotmail_b243df4f33245...@live.com] On Behalf Of Ken Schaefer
Sent: Tuesday, June 26, 2012 12:22 PM
To: NT System Admin Issues
Subject: RE: Hijack on RDP thread, Encryption of RDP traffic
Not sure what you mean
Schaefer
Sent: Tuesday, June 26, 2012 12:22 PM
To: NT System Admin Issues
Subject: RE: Hijack on RDP thread, Encryption of RDP traffic
Not sure what you mean by not seeing TLS traffic - how are you
verifying this?
FIPS compliant encryption is possible (using it). Found this article
that may
On Thu, Jun 21, 2012 at 9:55 AM, David Lum david@nwea.org wrote:
http://news.cnet.com/8301-1009_3-57457470-83/code-crackers-break-923-bit-encryption-record/?tag=txt;title
Article has little real info and is factually incorrect on important
aspects. Press release from Fujitsu is somewhat
Steve Gibson explained it pretty well on the latest Security Now.
On Thu, Jun 21, 2012 at 7:38 AM, Ben Scott mailvor...@gmail.com wrote:
On Thu, Jun 21, 2012 at 9:55 AM, David Lum david@nwea.org wrote:
http://news.cnet.com/8301-1009_3-57457470-83/code-crackers-break-923-bit-encryption
Pardon the OT, but damn, I hate Symantec and their extraordinarily
crappy uninstall routines!
We use their PGP Universal Server, and the Whole Disk Encryption (to
encrypt our laptop drives). And since we upgraded the server last week,
I can't upgrade my laptop client - I keep getting Internal
I
On Wed, Jan 18, 2012 at 3:12 PM, Mike Leone oozerd...@gmail.com wrote:
Pardon the OT, but damn, I hate Symantec and their extraordinarily crappy
uninstall routines!
We use their PGP Universal Server, and the Whole Disk Encryption (to
encrypt our laptop drives). And since we upgraded
To paraphrase War Games - The only way to uninstall is not to install.
-Original Message-
From: Mike Leone [mailto:oozerd...@gmail.com]
Sent: Wednesday, January 18, 2012 2:13 PM
To: NT System Admin Issues
Subject: OT - PGP Whole Disk Encryption uninstall problems
Pardon the OT, but damn
Disk Encryption (to
encrypt our laptop drives). And since we upgraded the server last week, I
can't upgrade my laptop client - I keep getting Internal Error 2721. Wise
Startup error. And while their Tech Support is trying, everything is
useless, to either re-install and fix it, or manually
On 1/18/2012 6:17 PM, Jonathan Link wrote:
Can you restore back to the point where it is fully installed?
I restored back to the day before I started decrypting and trying to
uninstall.
What version is this, out of curiosity, and how are you deploying
updates for PGP?
10.0.3, and the
://btsc.webapps.blackberry.com/btsc/search.do?cmd=displayKCdocType=kcexternalId=KB10498
Just in case you ever wanted/needed to know just how secure BB pin
messages are...
*bonk* -- sound of head hitting desk
At least they allow you to generate your own encryption key.
-- Ben
~ Finally, powerful endpoint
for the SMB market…
*
On Mon, Nov 21, 2011 at 6:26 PM, Steve Kradel skra...@zetetic.net wrote:
That's like, uh, public key encryption, because everyone has the key,
right? What could BE more public than (literally) global distribution of
the secret key?
Yuk.
On Mon, Nov 21, 2011 at 5:53 PM
That's like, uh, public key encryption, because everyone has the key,
right? What could BE more public than (literally) global distribution of
the secret key?
Yuk.
On Mon, Nov 21, 2011 at 5:53 PM, Andrew S. Baker asbz...@gmail.com wrote:
http://btsc.webapps.blackberry.com/btsc/search.do?cmd
Scary once you read it :S
From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Monday, November 21, 2011 4:54 PM
To: NT System Admin Issues
Subject: KB10498-What is peer-to-peer message encryption?
http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displayKC
http
At least they allow you to generate your own encryption key.
-- Ben
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send
This has the potential to be of import
http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
---
To manage subscriptions click here:
That's something we have to do here... boss wants the server HD's
encrypted.
Fun.
-Original Message-
From: Webster [mailto:carlwebs...@gmail.com]
Sent: Wednesday, October 13, 2010 12:19 PM
To: NT System Admin Issues
Subject: RE: Hard drive encryption
If required/mandated/ordered to do
Quick question for those of you who use full hard disk encryption...
What do you do when you have to remotely work on a machine and reboot
it?
I assume it will sit at the pre-boot encryption screen (which you can't
see) waiting for the password?
Any tools to get around this without having some one
I set mine to bypass re-login on graceful reboot.
From: David Mazzaccaro [mailto:david.mazzacc...@hudsonmobility.com]
Sent: Wednesday, October 13, 2010 9:17 AM
To: NT System Admin Issues
Subject: Hard drive encryption
Quick question for those of you who use full hard disk encryption
[mailto:david.mazzacc...@hudsonmobility.com]
Sent: Wednesday, October 13, 2010 7:17 AM
To: NT System Admin Issues
Subject: Hard drive encryption
Quick question for those of you who use full hard disk encryption...
What do you do when you have to remotely work on a machine and reboot it?
I assume it will sit
What app are you using to do this?
From: Sam Cayze [mailto:sam.ca...@rollouts.com]
Sent: Wednesday, October 13, 2010 10:32 AM
To: NT System Admin Issues
Subject: RE: Hard drive encryption
I set mine to bypass re-login on graceful reboot.
From: David
FDE Hard Drives. Me no-likely software based encryption for HDs.
Sam
From: David Mazzaccaro [mailto:david.mazzacc...@hudsonmobility.com]
Sent: Wednesday, October 13, 2010 9:37 AM
To: NT System Admin Issues
Subject: RE: Hard drive encryption
What app are you using to do
encryption…
What do you do when you have to remotely work on a machine and reboot it?
I assume it will sit at the pre-boot encryption screen (which you can't see)
waiting for the password?
Any tools to get around this without having some one sitting in front of the
machine?
.
~ Finally, powerful
So what?
Doesn't mean the IT guys isn't remotely logging into the site :)
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Sent: Wednesday, October 13, 2010 11:40 AM
To: NT System Admin Issues
Subject: Re: Hard drive encryption
we don't encrypt HDs on machines that don't
+1
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Sent: Wednesday, October 13, 2010 9:40 AM
To: NT System Admin Issues
Subject: Re: Hard drive encryption
we don't
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Sent: Wednesday, October 13, 2010 9:40 AM
To: NT System Admin Issues
Subject: Re: Hard drive encryption
we don't encrypt HDs on machines that don't leave the site. servers,
desktops et al.
only laptops.
Google.com Learn
If required/mandated/ordered to do so by your P.H.B.
Webster
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Subject: Re: Hard drive encryption
honestly asking
why would you encrypt the HD on a server?
~ Finally, powerful endpoint security that ISN'T
Subject: RE: Hard drive encryption
If required/mandated/ordered to do so by your P.H.B.
Webster
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Subject: Re: Hard drive encryption
honestly asking
why would you encrypt the HD on a server?
~ Finally, powerful
at 07:17, David Mazzaccaro
david.mazzacc...@hudsonmobility.com wrote:
Quick question for those of you who use full hard disk encryption…
What do you do when you have to remotely work on a machine and reboot it?
I assume it will sit at the pre-boot encryption screen (which you can't see)
waiting
who use full hard disk encryption…
What do you do when you have to remotely work on a machine and reboot
it?
I assume it will sit at the pre-boot encryption screen (which you can't
see)
waiting for the password?
Any tools to get around this without having some one sitting in front
encryption
Our HP Switches protect our desktops from theft. Don't ask how, they just
do.
Take that Cisco!
- Sean
On Wed, Oct 13, 2010 at 9:24 AM, Jonathan Link
jonathan.l...@gmail.comwrote:
Thieves can take a desktop nearly as easily as a laptop.
On Wednesday, October 13, 2010
-3505
From: Sean Martin [mailto:seanmarti...@gmail.com]
Sent: Wednesday, October 13, 2010 1:50 PM
To: NT System Admin Issues
Subject: Re: Hard drive encryption
Our HP Switches protect our desktops from theft. Don't ask how, they
just do.
Take that Cisco!
- Sean
On Wed, Oct 13, 2010
drive encryption
If you lose physical security to an asset, then it isn't your asset anymore,
therefore that HP switch isn't the cure to your ills.
(Unless being facetious)
Z
Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401
]
*Sent:* Wednesday, October 13, 2010 1:50 PM
*To:* NT System Admin Issues
*Subject:* Re: Hard drive encryption
Our HP Switches protect our desktops from theft. Don't ask how, they just
do.
Take that Cisco!
- Sean
On Wed, Oct 13, 2010 at 9:24 AM, Jonathan Link jonathan.l
From: David Lum [mailto:david@nwea.org]
Sent: Wednesday, October 13, 2010 2:03 PM
To: NT System Admin Issues
Subject: RE: Hard drive encryption
Ed, you need sleep...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764
: Thursday, 14 October 2010 1:16 AM
To: NT System Admin Issues
Subject: Re: Hard drive encryption
honestly asking
why would you encrypt the HD on a server?
Google.com Learn it. Live it. Love it.
On Wed, Oct 13, 2010 at 09:56, David Lum david@nwea.org wrote:
+1
David Lum // SYSTEMS
I am rolling PGP full disk encryption out this month, I am currently at 147
systems reporting in to the PGP console, with 45 of them people that are never
in the office (thank you SMS!!!). In our org if you have a laptop, the disk
gets encrypted. The central management features are the BOMB
We have an existing PointSec implementation, and are moving towards PGP
and/or Bitlocker.
-sc
From: greg.swe...@actsconsulting.net
[mailto:greg.swe...@actsconsulting.net]
Sent: Thursday, October 07, 2010 1:40 AM
To: NT System Admin Issues
Subject: RE: disk encryption
Ben,
We have
, and are moving towards PGP
and/or Bitlocker.
-sc
*From:* greg.swe...@actsconsulting.net [mailto:
greg.swe...@actsconsulting.net]
*Sent:* Thursday, October 07, 2010 1:40 AM
*To:* NT System Admin Issues
*Subject:* RE: disk encryption
Ben,
We have done clients with whole disk
We're evaluating Checkpoint as a whole disk encryption solution. We have a
product called NxTop (Virtual Computer is the company) that is a combination of
Imaging/encryption/USB management that works very well in most situations but
we're looking at Checkpoint for another project. We have also
to upgrade everyone just to get the same benefits of
true crypt.
From: John Cook [mailto:john.c...@pfsf.org]
Sent: Thursday, October 07, 2010 11:44 AM
To: NT System Admin Issues
Subject: RE: disk encryption
We're evaluating Checkpoint as a whole disk encryption solution. We have a
product
I have a small client, 15 laptops, 20 desktops , 8 servers on a 2008 domain.
We were discussing full disk encryption and turning off cached mode for
outlook etc etc. the client is pretty sensitive to protecting their data.
One of the items that came up was whether we should just move
, 20 desktops , 8 servers on a 2008
domain. We were discussing full disk encryption and turning off cached mode
for outlook etc etc. the client is pretty sensitive to protecting their
data.
One of the items that came up was whether we should just move to citrix so
nothing is on the laptops
from the last time they purchased anything.
From: Jon Harris [mailto:jk.har...@gmail.com]
Sent: Wednesday, October 06, 2010 11:39 PM
To: NT System Admin Issues
Subject: Re: disk encryption
Why not just put everything on Citrix and have done with it? Not
criticizing just asking? I would
Ben,
We have done clients with whole disk encryption on the laptops. Works great.
Doesn't protect against anything when the system is actually running, only when
the laptops are stolen. PGP Desktop Whole disk is what we used then, but I
would seriously look at Truecrypt now. Nice thing
situation are you trying to protect against?
Cheers
Ken
From: Cameron Cooper [mailto:ccoo...@aurico.com]
Sent: Saturday, 10 July 2010 1:40 AM
To: NT System Admin Issues
Subject: RE: Database Encryption
Looking to protect the information on the MD3000, since that's where all the
data is stored
All,
We are looking to replace our database servers with new hardware and
software and will be running Windows Server 2008 R2 Enterprise Edition
(64bit), with SQL Server 2008 R2 Standard on each machine. Also, each
machine connects into a MD3000.
What would be the best way to encrypt the
Is any other way supported?
BitLocker, I'd guess.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Cameron Cooper [mailto:ccoo...@aurico.com]
Sent: Friday, July 09, 2010 12:32 PM
To: NT System Admin Issues
Subject: Database Encryption
All,
We
Two questions,
One how many databases are you moving to SQL 2008, maybe there is the
ability to go with Enterprise Edition R2 for the transparent data
encryption you are seeking, and just have 1 database cluster accordingly
( Active/ Passive). You don't have to go per-processor
: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Friday, July 09, 2010 12:14 PM
To: NT System Admin Issues
Subject: RE: Database Encryption
Two questions,
One how many databases are you moving to SQL 2008, maybe there is the
ability to go with Enterprise Edition R2 for the transparent
What threat are you actually trying to protect against? The application will
need to access the data in cleartext (since you are not using in-field
encryption of data). So, the only threat that I can see you mitigating is theft
of the server, or theft of the disks in the server. You could just
| www.aurico.com
From: Ken Schaefer [mailto:k...@adopenstatic.com]
Sent: Friday, July 09, 2010 12:26 PM
To: NT System Admin Issues
Subject: RE: Database Encryption
What threat are you actually trying to protect against? The application
will need to access the data in cleartext (since you
...@adopenstatic.com]
*Sent:* Friday, July 09, 2010 12:26 PM
*To:* NT System Admin Issues
*Subject:* RE: Database Encryption
What threat are you actually trying to protect against? The application
will need to access the data in cleartext (since you are not using in-field
encryption of data). So, the only
it in your case.
So back to my other suggestions along with Ken's Bitlocker can do it, or
the 3rd party encryption utilizes,
Z
Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401-639-3505
From: Ken Schaefer
ASB,
They are only specifying encryption of the database, we would assume its
at rest, but it has to be unencrypted when its being utilized for the
application etc etc to read the data from the database itself.
Encryption at rest on the disk would be either SQL or the 3rd party
disks
: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Friday, July 09, 2010 12:59 PM
To: NT System Admin Issues
Subject: RE: Database Encryption
I agree, and if you if you are using high-end SAN Based Disk, then
stealing the physical drives of the database files and its backups rest
on, wont
Understood, but encryption at rest only offers one level of protection.
Without encryption in motion, there are more places for the data to be
exposed.
Plus, it will be a relatively expensive activity from a performance
standpoint.
-ASB: http://XeeSM.com/AndrewBaker
On Fri, Jul 9, 2010 at 2
I saw very little difference on a laptop with an Intel SSD. Maybe 5%
less disk speed using ATTO.
From: Ken Schaefer [mailto:k...@adopenstatic.com]
Sent: Friday, May 28, 2010 8:47 AM
To: NT System Admin Issues
Subject: RE: laptop encryption
Bitlocker has a huge impact on high-performance
Bitlocker has a huge impact on high-performance disks (e.g. SSDs). On the plus
side, Bitlocker has the management tools in place for recovery.
It's all when and good to use disk-level encryption or TruCrypt (I use the
latter). But if you have 10k+ machines to manage, you need centralised
encryption
There was a post last week about HIPAA compliance and a small part of that
discussion there were a couple of encryption programs mentioned. I have
bitlocker running on the OS's that happen to come with it, and need
something for those that don't. Might consider OS upgrade
Agreed.
There are too many situations where it's not feasible to expect that people can
work with a permanent VPN/remote connection.
Cheers
Ken
From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Friday, 28 May 2010 10:57 PM
To: NT System Admin Issues
Subject: Re: laptop encryption
While
Subject: laptop encryption
There was a post last week about HIPAA compliance and a small part of that
discussion there were a couple of encryption programs mentioned. I have
bitlocker running on the OS's that happen to come with it, and need
something for those that don't. Might consider OS
There was a post last week about HIPAA compliance and a small part of that
discussion there were a couple of encryption programs mentioned. I have
bitlocker running on the OS's that happen to come with it, and need
something for those that don't. Might consider OS upgrade if the encryption
piece
,
please contact the sender by reply email and delete all copies of this
message. Thank you.
From: Jeff Brown [mailto:2jbr...@gmail.com]
Sent: Thursday, May 27, 2010 9:58 AM
To: NT System Admin Issues
Subject: laptop encryption
There was a post last week about HIPAA compliance and a small part
, May 27, 2010 7:58 AM
To: NT System Admin Issues
Subject: laptop encryption
There was a post last week about HIPAA compliance and a small part of that
discussion there were a couple of encryption programs mentioned. I have
bitlocker running on the OS's that happen to come with it, and need
We're using Symantec Endpoint Encryption, biggest pile of crap ever.
We were rolling it out to external self employed contractor types, killed
nearly half of them.
Switched to TrueCrypt on any that didn't work, management soon realised
what a mistake they made.
A hell of a lot easier
I opted for encryption at the hardware level via FDE disks. No
performance decrease, however, no central management. It's so easy and
set and forget, that I don't mind that.
Sam
From: Jeff Brown [mailto:2jbr...@gmail.com]
Sent: Thursday, May 27, 2010 9:58 AM
To: NT System Admin Issues
I have only used bitlocker so far and have not notice performance issue. Is
truecrypt going to punk out my portables?
On Thu, May 27, 2010 at 10:16 AM, Sam Cayze sam.ca...@rollouts.com wrote:
I opted for encryption at the hardware level via FDE disks. No performance
decrease, however
,
but not for the headaches.
On Thu, May 27, 2010 at 10:11 AM, tony patton
tony.pat...@quinn-insurance.com wrote:
We're using Symantec Endpoint Encryption, biggest pile of crap ever.
We were rolling it out to external self employed contractor types, killed
nearly half of them.
Switched
, 2010 at 10:11 AM, tony patton
tony.pat...@quinn-insurance.com wrote:
We're using Symantec Endpoint Encryption, biggest pile of crap ever.
We were rolling it out to external self employed contractor types, killed
nearly half of them.
Switched to TrueCrypt on any that didn't work, management
: david@nwea.org
--_000_038712CAF487CE46B2323FE43D6224B781E2E43FC2LKOEXCH01Amer_
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
PGP encryption reports to a management station, I can see who has encrypted=
disks and who doesn't. Not a free solution
We[1] decided to abandon PointSec encryption and go with PGP here a bit
back then of course Sym-crap-tec bought PGP...
-sc
[1] And by we I mean the gov decided and gave us marching orders...
-Original Message-
From: David Lum [mailto:david@nwea.org]
Sent: Thursday, May 27
1 - 100 of 211 matches
Mail list logo