Data security threats are becoming more prevalent all the time. According to one survey, 63 percent of organizations had one or more advanced attacks during the past 12 months.
No one is immune. Take the case of parents enrolling their child in a new school. The parents must provide the child’s birth date, address, vaccinations, past transcripts and other personal information. Often, they must provide bills as proof of residency and their drivers’ licenses as a form of ID. Most of this information is stored digitally. Consider the consequences to the parents and the school if there is a server breach or someone loses a USB drive that includes this data.
In the business world, changes in the way people work are creating new vulnerabilities. Anywhere, anytime work means more people are using mobile devices, which adds to the risk of data becoming lost or stolen. In addition, employees are increasingly using services ranging from personal email accounts to cloud-based sync-and-share services, all of which could also expose data to breaches. Endpoints are often the weakest links in the fight against data security threats. Organizations need to protect the full range of endpoints — from mobile devices and laptops to Internet of Things (IoT) devices and branch office servers — that can be entryways for hackers looking to steal data or infiltrate company networks.
Malware protection is necessary but not sufficientHow do you keep data protected at all times? How can you help ensure data will be safe from unauthorized use when it falls into the wrong hands? Malware prevention alone is not enough. While the right anti-malware solution can keep malicious code such as ransomware from executing, an additional layer such as encryption is needed to fully protect data throughout its lifecycle. By encrypting data, you can keep information secure even if it is lost or stolen, because it is unreadable by anyone but authorized users.
With a layered security approach that includes malware prevention and data encryption, organizations can protect their valuable information, whether it resides on a PC, branch office server, USB drive, mobile device or a cloud-based file sync-and-share service. The consequences of not providing encryption protection can be severe. If data is lost or stolen, organizations face loss of revenue, a damaged reputation and erosion of customer loyalty as well as fines for not complying with regulations.
What to look for in an encryption solution Here are a few key capabilities your encryption choice should include:
1. A single solution that protects a multi-vendor IT landscape and external media.
Organizations need a vendor- and OS-agnostic solution that covers multiple device types and operating systems across the enterprise, eliminating gaps in data protection.
2. Integration with existing processes for authentication, patching and more.
Protecting data shouldn’t require your IT group to overhaul existing processes and solutions.
3. Ability to encrypt based on end-user profiles, groups and data.
Not all users, groups and data can be encrypted with the same key. Your solution should provide the flexibility to encrypt different types of user data with their own unique keys.
4. Centralized encryption management.
Your IT group should be able to manage a full range of capabilities, technologies and policies without excessive complexity. For example, administrators should be able to set encryption policies, manage self-encrypting drives and have granular port control for multiple device types and external media — all without having to shuttle among numerous interfaces.
5. Encryption for data on the go.
Data today is often accessed, shared and stored in places other than corporate devices. An encryption solution should keep files encrypted and protected whether employees access them on their personal devices, upload them to a cloud sync-and-share service or transfer them to external storage devices such as USB drives.
To keep your data secure throughout its lifecycle, consider Dell Data Protection | Encryption, which is part of the portfolio of Dell Data Security Solutions. For additional information about Dell Data Security Solutions, check out additional articles here on the Dell Tech Center .
 Ponemon, March 18, 2016, http://www.ponemon.org/blog/new-ponemon-study-on-malware-detection-prevention-released