" Other than outsourced Exchange, what else has changed?"
Nothing. At. All.

We've followed their recommendations and given some uses new machines with SSD 
drives, i5 processors, etc, no change. I have been forwarding your guys' 
comments to our team that's working this, so I really appreciate your guys' 
input!

From PGP's documentation - wrappage 
(http://www.google.com/url?sa=t&source=web&cd=2&ved=0CDMQFjAB&url=http%3A%2F%2Fdownload.pgp.com%2Fpdfs%2Fwhitepapers%2FHWDEW_WP.pdf&ei=F7GJTtq3LqriiAL39cmkDA&usg=AFQjCNEmg2M8ZQVBWdVogIxSLCwCok7m7w)

" A boot sequence executes during the startup process of Microsoft® Windows, 
Apple Mac OS X, or Linux® operating systems. The boot system is the initial set 
of operations that the computer performs when it is switched on. A boot loader 
(or a bootstrap loader) is a short computer program that loads the main 
operating system for the computer. The boot loader first looks at a boot record 
or partition table, which is the logical area “zero” (or starting point) of the 
disk drive. Whole disk encryption modifies the zero point area of the drive.

File System Basics
During the boot process, the system initializes file systems.
When a user requests access to a file (i.e., creates, opens, or deletes a 
file), the request is sent to the operating system input/output (I/O) manager, 
which forwards the request to the file system manager. The file system manager 
processes data in blocks.

Life with Encryption: Business as Usual
Most whole disk encryption software operates in conjunction with the file 
system architecture. It filters I/O operations for one or more file systems or 
file system volumes. When a drive is encrypted with whole disk encryption for 
the first time, it converts unencrypted drive blocks into encrypted blocks one 
at a time (Figure 2).

Decrypted data is never available on the disk.
When a user access a file, PGP Whole Disk Encryption decrypts the data in 
memory before it is presented for viewing. If the user makes any changes to the 
file, the data is encrypted in memory and written back to the relevant disk 
drive blocks just as it would be without encryption. Because PGP Whole Disk 
Encryption operates in conjunction with the file system, there is no additional 
wear and tear or performance impact beyond normal disk operation. As far as the 
user is concerned, it’s business as usual, and the underlying mechanism of 
encryption/decryption is completely transparent."

Not quite as detailed as what Michael sent about Bitlocker

-----Original Message-----
From: Ken Schaefer [mailto:[email protected]] 
Sent: Saturday, October 01, 2011 6:55 AM
To: NT System Admin Issues
Subject: RE: Outsourcing Exchange

This is all rubbish.

If PGP works a  file system filter driver (Microsoft's API for AV etc for 
hooking into disk read/writes) then either PGP is corrupting the files 
(unlikely since you never had this problem before), or some other FSF driver is 
causing the problem (again unlikely, since you've never had this problem 
before), or something else is causing the problem. Other than outsourced 
Exchange, what else has changed?

Cheers
Ken

-----Original Message-----
From: David Lum [mailto:[email protected]]
Sent: Saturday, 1 October 2011 2:45 AM
To: NT System Admin Issues
Subject: RE: Outsourcing Exchange

We have talked about Bitlocker, but there's no guarantee that will be any 
better. Heck our Exchange provider didn't know PGP was an issue, and 'll bet 
PGP is more prevalent than Bitlocker.

We're being steered to Win7/Office 2010/Remove PGP as all being needed to help 
resolve these issues. At 500 employees at least 450 are on XP / Office 2007 and 
300+ have PGP on them. The Win7/2010 end state is desirable, it's the 
compressed timeframe that isn't.

Dave



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to