TITLE

POINTSEC EXTENDS DATA ENCRYPTION TO LINUX

PUB. DATE
January 2005
SOURCE
UNIX Update;Jan2005, Vol. 16 Issue 1, p7
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article reports on the expansion made by Pointsec, the worldwide de facto standard for mobile device security, to its endpoint security solutions to encompass Linux, the world's fastest-growing operating system. Pointsec for Linux enables users to protect their most confidential data stored on laptops and desktop computers running Linux. Pointsec is the only company in the endpoint security market to provide complete hard disk encryption for this increasingly important enterprise platform. Pointsec's data encryption solutions enable secure deployment of mobile devices, giving users complete confidence that confidential information is available only to legitimate users. Pointsec ensures instant, automatic encryption and decryption that is transparent to users and does not impede performance or productivity. Pointsec supports every major operating system for personal computers, personal digital assistants, and smart telephones, and secures all information stored on the mobile devices and on removable memory media with full-disk encryption. Pointsec for Linux will be available in early 2005. With this latest release, Pointsec solidifies its position as the leader in mobile device security--with the most customers deployed, highest level of security certification, and more complete device coverage than any other company. Pointsec has also been recognized by the Gartner Group for three years running as the only Leader in its Magic Quadrant for mobile data encryption.
ACCESSION #
15501450

 

Related Articles

  • Protect and attach.  // Management Services;May2003, Vol. 47 Issue 5, p34 

    Pointsec Mobile Technologies AB will roll out file encryption software that will empower users to encrypt a document and pass on sensitive information securely. The recipient does not need to have the software installed. Instead, the file decrypts itself once the correct password has been...

  • Butterfingered mobile device users create further IT risk. Wexler, Joanie // Network World;2/21/2005, Vol. 22 Issue 7, p61 

    The article reports that the need for a structured approach to the management and security of mobile devices is escalating. Smartphone-style devices, in addition to supporting voice communications, are increasingly likely to store sensitive corporate data and intranet connections. They are most...

  • AstraZeneca commits £700,000 to beef up workstation encryption.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2004, p18 

    Discusses the plan of pharmaceutical company AstraZeneca to encrypt its workstations worldwide in a bid to improve user authentication. Cost of the project; Kinds of mobile equipment which can be used by authorized users in accessing data according to service provider Pointsec Mobile...

  • Mobile IT security.  // Management Services;Dec2003, Vol. 47 Issue 12, p31 

    Pointsec Mobile Technologies has a new mobile security solution--Pointsec for Symbian OS. The company already has security solutions for Windows-based computers. Pocket PC and Palm OS and the Symbian one completes its protection for all leading mobile platforms. If a Symbian OS device is stolen...

  • HOW NOT TO GET Confickered. Yates, Darren // Australian NetGuide;Jun2009, Issue 133, p48 

    The article presents suggestions for preventing a computer from being infected with the Conficker virus. It states that the virus is a dangerous viruses that aims to worm its way into the Windows operating system. One of the methods to protect a computer is to set the program Windows Vista to...

  • Transparent Emergency Data Destruction. Roberts, Warren; Johnson, Christopher; Hale, John // Proceedings of the International Conference on Information Warfa;2010, p271 

    A wide variety of tools offer users the ability to encrypt their sensitive information with private passphrases or key files. These technologies do little - if anything - to protect users from being compelled to produce the pass-phrase or key file. Under duress, a user may have few options other...

  • Encrypting File System.  // Network Dictionary;2007, p176 

    A definition of the term "Encrypting File System" (EFS) is presented. It refers to a feature of the Microsoft Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent. The EFS may be used for...

  • Check Point to buy mobile security specialist.  // Network World;11/27/2006, Vol. 23 Issue 46, p5 

    The article reports on the expansion plan of Check Point by acquiring the mobile devices technology of Pointsec Mobile Technologies AB. The company is planning to expand the scope of its security products by adding data encryption on its mobile technologies. Gil Shwed, chairman and CEO,...

  • Secure your smartphone.  // Management Services;Aug2004, Vol. 48 Issue 8, p28 

    This article reports on the launch of Pointsec Mobile Technologies' Pointsec for Symbian OS 2.0, the 2004 version of its security package for mobile devices running Symbian OS, primarily to bring users of Sony Ericsson smartphones into their mobile data protection. Information stored on personal...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics