
Introduction
| 11
Endpoint Encryption for Files and Folders supports three standard algorithms with
various key lengths, including the Endpoint Encryption FIPS 140-2 certified AES 256
algorithm.
Endpoint Encryption for Files and Folders encrypts the Windows' pagefile. This feature
is automatic and cannot be configured or disabled. The pagefile is overwritten when
the computer is restarted. Again, any new data being written to the pagefile is
automatically encrypted. This option prevents hackers from finding fragments of
sensitive data stored in the paging areas on the hard disk.
With central management using the Endpoint Encryption Manager, and distribution of
encryption keys using the secure Endpoint Encryption Server, it is easy to allow
sharing of encrypted files within an organization. By assigning groups of users to
encryption keys, the users in the group can exchange and read encrypted files like any
other file, without noticing any difference. Users not assigned to the key will not be
able to read files encrypted with that key.
Using this mechanism it is possible to protect files and folders on shared units, e.g. a
network drive, from unauthorized access by encrypting it with a proper key and
allocating selected users to this key only. This approach provides for encryption key
hierarchies to be created, with an organization common key at the bottom (which
every user has), to specific department or group keys at the top (assigned only to
selected users within that department or group).
The Endpoint Encryption Manager also provides for a separation between security
administration and system administration. Only dedicated security administrators can
be authorized to deal with encryption management, thereby excluding system
administrators from access to encrypted data. Moreover, various security levels can be
created among the security administrators, preventing some (most) administrators
from critical functions while allowing only a few administrators to access all the
functions in the system.
Management
Endpoint Encryption for Files and Folders communicates with an Endpoint Encryption
Management Centre Server to update its policy whenever the user authenticates to
Endpoint Encryption for Files and Folders, i.e. tries to access encrypted data or logs on
to Endpoint Encryption for Files and Folders. NOTE: the user must be online. Endpoint
Encryption for Files and Folders will work also when offline, provided that the
encryption key(s) used are made available offline (this is a policy setting per
encryption key or encryption key group).
You can create a policy from the Endpoint Encryption Manager, and then create an
install set from it. When the Endpoint Encryption for Files and Folders client is
Comentarios a estos manuales