Internal Encryption?

Posted on 2006-04-18
Last Modified: 2010-04-11
I have a customer who is renewing a contract with a bank an they have gotten some suggestions that are recommended and I do not know what they want with this one. Can someone please explain this and some possible solutions?

Suggested Requirement = Consider encrypting data using a strong, commercially-proven algorithm, while in transport on your internal network and in storage.

I understand the requirements that they listed but this. It is not that I do not understand. I know what they want but is it possible to encrypt data transfer on an internal network? What is used to do this? The network consistes of 3 PC's and a 2000 server. Not a domain, this is a workgroup setup. Hopefully I will be able to get a Small Business Server in there soon to set up a domain envrionment.

Thank experts. This one has just stumped me for some reason.
Question by:maderosia
    LVL 14

    Assisted Solution

    by:Juan Ocasio
    LVL 32

    Expert Comment

    What kind of internal data? and by what means? The 3PCs talk to Windows 2000 server and if you can explain what kind of traffic, we may be in a better understanding.

    LVL 32

    Accepted Solution

    Windows supports IPSEC which would meet the above requirement.  It's standard with Windows (i.e. doesn't require 3rd party tools) and fairly easy to setup.

    LVL 1

    Author Comment

    Thanks all
    jhance found what I was looking for but I am splitting the points because you both jocasio and jhance provided me info for what I ws looking for.
    I did not know that you could use IPsec on interdomain traffic.

    Rajesh - I am guessing that by the suggested requirement that they mean all network traffic. The 3 pc's users use Microsoft Access to sort data and store everything on their 2000 server. That is all the traffic. besides printing out reports.

    Thanks again,

    Featured Post

    Courses: Start Training Online With Pros, Today

    Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

    Join & Write a Comment

    SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
    When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    21 Experts available now in Live!

    Get 1:1 Help Now