The Microsoft Windows 8 operating system will bring the Trusted Platform Modules (TPMs, the basis of storage device-based encryption security as well as additional security features) to wider use for enterprise applications.
But the Justice Department and the FBI want Congress to pass a quite different bill, one, which would make it easier for them secretly to gain access to suspects' computers in their homes, to gather passwords, to install "recovery devices" and to disable encryption and security software.
Hardware accelerated encryption is the biggest security feature, but for hardware encryption to be effective it has to be implemented correctly.
The newly implemented 256-bit Full Disk Encryption provides additional security on a hardware basis.
ENGADGET: Samsung spices up the USB 3.0 hard drive party with three new models
At the heart of the matter is DirecTV's desire to bring the management and encryption of its security cards in-house.
The U.S. government argues that it needs to control the export of strong encryption for national security purposes to fight terrorism.
CNN: U.S. government to set new standard for advanced encryption
AOL, which will eventually add data-encryption, content-security and trusted-partner features to their own messaging software.
Encryption has been a security must-have in the private enterprise networks for some time.
Among the technologies it accused Steve Jobs and his team of "borrowing" were wireless data, speech coding, security and encryption.
Installing security and encryption solutions (are another) way to do it.
The M5M also features 256-bit AES full-drive encryption, ensuring maximum data security.
Companies will usually have tightly managed internal networks, with firewalls, encryption, etc. for ensuring security of their data.
Other features include full data path protection, embedded AES (Advanced Encryption Standard) engines for data security, and other resource optimization features.
ENGADGET: BiTMICRO's next-gen SSD controller to deliver blazing speed and big storage in 2012
All of these systems provide for encryption capabilities as another layer of security, assuming the option is turned on and actually utilized by different agencies and operatives.
FORBES: Free Speech v. Denial Of Communications For Public Safety Agencies?
What about requiring every third-party service provider to protect personal customer data through encryption, tokenization or another advanced security technology, through clauses written into and enforced as part of standard service level agreements?
FORBES: The Epsilon Hack Attack: Time For "SOX For Consumers"?
MacKeeper is a suite of 16 software utilities including Internet security, file recovery, data encryption and back-up.
FORBES: Thoughts on Three Potentially Disruptive Companies at MacWorld
And for the ultimate in security, AES 256-bit encryption prevents unauthorised file access to the key with password protection.
ENGADGET: Lacie USB 3.0 RuggedKey now shipping: $40 for 16GB, $70 for 32GB
The new technique may serve as a wake-up call for mobile carriers, which have long been in denial about the vulnerabilities of GSM security, says Bruce Schneier, encryption guru and chief technology officer of BT Counterpane.
Consumer electronics firms, which dictated the last encryption format, never had much to lose from security leaks.
Some commonly used digital cellular telephones are designed with encryption capabilities and must be certified by the Federal Security Service.
FORBES: Russia's FSB Receives Decrypted BlackBerry Messages From Mobile TeleSystems
Matt Pauker is a co-founder of Voltage Security, a provider of enterprise software and encryption services.
FORBES: The Epsilon Hack Attack: Time For "SOX For Consumers"?
For security, Airport Extreme employs 128-bit WEP encryption and comes with its own firewall.
But the security community knows that the boldest claims about new encryption technology demand the most scrutiny.
FORBES: Researchers Warn: Mega's New Encrypted Cloud Doesn't Keep Its Megasecurity Promises
Encryption technology is an important element of an information-centric security solution, as critical information is increasingly on mobile devices and in the cloud.
FORBES: Symantec Acquires Encryption Provider PGP For $300 Million
Export of software from the U.S., including software that deploys encryption functions, is controlled by the Bureau of Industry and Security ( BIS) in accordance with the Export Administration Regulations ( EAR).
FORBES: As Inflation Rages In Iran, Bitcoin Software Not Available
Motorola PHOTON Q is Business Ready with full corporate security including remote wipe, pin lock, and data encryption.
ENGADGET: Sprint's Motorola Photon Q LTE is coming 'very soon' (update)
Based on a unified key management and policy infrastructure, the PGP(R) Encryption Platform offers the broadest set of integrated applications for enterprise data security.
FORBES: Symantec Acquires Encryption Provider PGP For $300 Million
Hirai went on to talk vaguely about increased security measures aimed at preventing future hacks, including upgraded encryption, more firewall protections, and an early warning system to detect attacks.
Outgoing Drug Enforcement Administrator Thomas Constantine, offering the most dire predictions, said lawmakers would create "an electronic sanctuary" for criminals intent on disrupting public safety or national security if the plan to drop controls on exports of encryption technology is not stopped.
"The worry is that adding any encryption would hit performance, and performance is everything, " said one security director of a financial institution attending the talk, who asked not to have his name or employer revealed.
应用推荐