Encryption solutions secure your data by encrypting your desktops, laptops, removable media, CDs, email, network files, cloud storage and other devices. Information can only be accessed with the right keys to decrypt data by entering a password.

Some encryption solutions can be configured so that data is automatically decrypted for authorized users—so they don’t need to enter an encryption key or password to access the information.

Depending on the product, encryption solutions often include key management (facilitating the storage, exchange and recovery of encryption keys), encryption policy enforcement, and centralized management and reporting features. Encrypting any data you have stored by a third party is an important security measure. Additionally, mobile workers can access encrypted data on the go from their mobile devices, including smartphones and tablets.

Encryption solutions allow you to protect your confidential information and comply with regulatory mandates for data security.

Back to Security Protection A-Z

Back to Threatsaurus Home

download Threatsaurus: A-Z of Threats
Download now