Symantec Protects Information from Accidental Loss and Unauthorized Access

06 Feb

Symantec Corp. announced Symantec Endpoint Encryption 7.0, providing advanced encryption for desktops, laptops and removable storage devices. Symantec Endpoint Encryption offers a scalable security solution that prevents unauthorized access to endpoints by delivering strong encryption and access control technologies. Encryption and authentication are both transparent to the end-user, performed with minimal performance impact and delivered through a central management console, enabling central deployment and management of encryption to endpoints.

Customers are provided extended client support so more endpoints can be centrally managed. Symantec Endpoint Encryption now includes support for clients not managed by Active Directory. The new version includes Novell eDirectory client support as well as full management capabilities for non-domain clients. Furthermore, Symantec Endpoint Encryption obscures and protects access to disk encryption keys in memory (DRAM), dramatically increasing protection against cold boot attacks (an attacker with physical access to a computer is able to retrieve encryption keys after using a cold reboot to restart the machine).

In order to improve ease-of-use for the IT administrator, Symantec Endpoint Encryption offers enhanced disk recovery tools to make it easier for the administrator to access a machine and set usage rights to further protect confidential information.

Encryption of removable media has also been enhanced. Symantec Endpoint Encryption features support for more secure data portability options, including user-created self-extracting file archives. User certificates can also be leveraged to control access to encrypted data within a specific group of users.

According to the Symantec Internet Security Threat Report, theft or loss of computer or other data-storage medium was the cause of the most data breaches that could lead to identity theft, accounting for 57 percent of the total.

“The number one way companies are losing confidential information is through theft or loss of laptops and storage devices,” said Steve Morton, vice president, product management, Symantec. “As a growing array of endpoint devices are granted access to corporate resources, the need to properly ensure endpoint security and encryption on each of these endpoints is more prevalent than ever as these technologies will help businesses mitigate the increasing risk of information loss.”

Symantec Endpoint Encryption includes audit report generation capabilities to help answer regulatory requirements for proving encryption and avoiding obligatory disclosure by offering full audit trails, thereby enforcing mandatory, company-wide security policies and mitigating risks of data loss. Symantec Endpoint Encryption 7.0 has FIPS 140-2 certification.

Customers are offered both full disk and removable storage encryption capabilities. Symantec Endpoint Encryption is designed to protect all data on the hard drive of a Microsoft Windows-based machine. It allows administrators to encrypt the laptop’s hard drive to ensure safe harbor and, more importantly, to prevent the exposure of sensitive data should the laptop be lost or stolen.

Symantec Endpoint Encryption also enables businesses of all sizes to maximize the productivity benefits of using removable storage devices while minimizing the risks these devices pose to data security. It is designed to protect all data on USB, FireWire, Compact Flash, iPod and other storage devices and media.

Licensing and Availability

To better suit individual customer needs, Symantec Endpoint Encryption is available in three formats – Symantec Endpoint Encryption (includes both Full Disk and Removable Storage Editions), Symantec Endpoint Encryption – Full Disk Edition and Symantec Endpoint Encryption – Removable Storage Edition. For more information, please visit

Leave a comment

Posted by on February 6, 2009 in Symantec


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

<span>%d</span> bloggers like this: