Platin Bilişim has cooperations with the strongest and leader brands. Our target is not only make a difference on our rivals via our certificated and powerful engineer staff but also; providing IT security products and services for our customers from end to end.

PGP Encryption

Protect Your Customers and Your Organization - For most organizations today, the primary driver behind deploying an encryption solution is to protect customer privacy and lessen the impact of a potential data breach. In an era where cyber-attacks are growing and becoming increasingly sophisticated, it’s not surprising to find that the number of data breaches has also grown exponentially.

According to Symantec’s Internet Security Threat Report (ISTR), 2014 saw 23 percent more data breaches than the previous year, with an average of 1.1 million identities exposed per breach. Organizations are paying more to recover with the average cost due to a breach being $3.5 million dollars. Regulatory requirements make encryption a necessity for many. Companies that need to comply with regulations such as PCIDSS or HIPAA must have an auditable encryption solution in place to protect the privacy of customer data.

In many cases, when a data breach occurs, organizations must notify victims and governing bodies of what happened. With encryption in place, organizations can apply for Safe Harbor, removing the need to disclose if a data breach occurred. 

Comprehensive Endpoint Encryption

For today’s mobile workforce, laptops and removable media devices capable of storing gigabytes of data have provided the freedom of being able to work from anywhere. Increasingly, employees are logging into corporate networks from hotel rooms, coffee shops and airports. With this freedom comes a much greater risk of devices with sensitive data being lost or stolen. For security administrators and executives, this means greater risk of a costly data breach. Symantec Endpoint Encryption combines strong full-disk and removable media encryption with an intuitive central management platform to protect sensitive data from loss or theft and help administrators prove a device was encrypted should it go missing. 

  • Maximize Protection
    During the initial encryption phase, Symantec Endpoint Encryption encrypts each drive, sector by sector, ensuring no files are left unencrypted for maximum protection.
  • Ease of Use
    Once encrypted, a user need only enter their passphrase once and single –sign-on technology passes them through to their main screen, eliminating the need to re-input multiple passwords. As users access their information, decryption and re-encryption happen instantaneously for a seamless experience. 
  • Multiple Recovery Options
    Multiple recovery options allow organizations to find the right mix of self-recovery and helpdesk support for their users. Local self-recovery allows users to set up customizable questions and answers to regain entry while help-desk support features a one-time use token that the user can insert into their machine. As an added security measure, this token changes after every use.
  • Flexible Removable Media
    Removable media users can access their data on any Windows or Mac system, even if encryption isn’t installed on the machine they are using. Symantec Endpoint Encryption supports various types of removable media, including USB drives, external hard drives, and CD/DVD/Blu-ray media.

Enterprise Class Management

Automation and key management are critical to success when implementing an encryption solution. Symantec Endpoint Encryption offers an integrated management platform to allow organizations to quickly deploy and manage their endpoint encryption solution from a single console.

  • Scalable
    Improved management architecture provides superior scalability over previous platforms and easily adapts to large enterprise environments.
  • Automated
    Administrators can sync user and group profiles with active directory to automate key management and policy controls across the organization, speeding deployments and reducing administrative overhead.
  • Robust Reporting
    Compliance reports can be used out-of-the-box or customized to help ease the burden of proof to auditors and key stakeholders.
  • Heterogeneous Encryption
    Management capabilities have been extended to provide support for native OS encryption (BitLocker and FileVault) and Opal compliant self-encrypting drives. 
Do you want to get more information about PGP Encryption?