SearchDataBackup spacer spacer
spacer

Portable storage encryption best practices

by
Jerome Wendt
DCIG Inc.

Sensitive corporate data often resides on portable storage devices, which could present a liability if lost or stolen. Here are some tips for encrypting data on these devices.

This Article Covers

Security

RELATED TOPICS

  • Data reduction
  • Backup tools
  • Disk backup
  • Remote backup
  • Tape backup

Looking for something else?

  • How does Office 365 Clutter affect data retention?
  • How to secure your disk-based backups
  • Restoring data from backups after a security breach
+ Show More
  • Share this item with your network:

Portable data storage devices such as laptops, thumb drives, Blackberries and iPods are now a permanent part of the corporate data landscape. Sensitive corporate data and intellectual property is residing on these devices, which, if lost, could present a serious liability to companies. Here are some best practices for encrypting data on these devices.

Centralize policy creation and control

Encryption software for mobile devices should support encryption policies that administrators can centrally create and manage to ensure mobile users don't circumvent corporate policies. Centennial Software Ltd.'s Devicewall and GuardianEdge Technologies Inc.'s Device Control and Removable Storage Encryption products can encrypt data and provide centralized encryption policy management for portable storage devices.

Data classification

Encryption software should include a discovery and reporting component so companies can quantify how much, and what, data is stored on portable devices, as well as what the potential risk is if loss or theft occurs. Products from Tablus Inc. and Vontu Inc. identify data being copied to devices and can prevent or audit those activities.

Encryption key creation

Formulate encryption policies that force mobile users to create and use complex encryption keys, or use third-party software that creates and manages the encryption keys for them. Devicewall and GuardianEdge tie into Active Directory, through which companies can create policies for the creation and management of user encryption keys.

Restrict data storage on new mobile devices

New portable storage devices from digital cameras to iPods are capable of storing hundreds of gigabytes of data in unencrypted formats. Short term, create policies that restrict users from storing data on these devices; longer term, implement products that encrypt data stored to these mobile devices and adhere to corporate encryption key generation and management policies.

This article first appeared in Storage magazine. Click here for the entire article.


This was first published in April 2008

Dig Deeper on Data backup security

  • All
  • News
  • Get Started
  • Evaluate
  • Manage
  • Problem Solve
  • Druva looks to enhance e-discovery jobs with Mobile Forensics
  • How does Office 365 Clutter affect data retention?
  • How to secure your disk-based backups
  • Restoring data from backups after a security breach
  • Druva looks to enhance e-discovery jobs with Mobile Forensics
  • Backupify to offer APIs for third-party vendors
  • Druva adds laptop security via encryption, device tracking
  • Data backup and recovery news briefs: Atempo announces new support for Mac OS X Snow Leopard
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.