Link to home
Start Free TrialLog in
Avatar of ltrcne
ltrcne

asked on

Hard Disk Encryption - HP Drivelock vs Windows Bitlocker

We have all HP equipment and for the last few years I have used Drivelock to protect (encrypt?) these drives.  I have concerns that drivelock is not true drive encryption and debating if we should switch to using Bitlocker, we are starting to roll out windows 7 enterprise.  Has anyone had any experience with using Drivelock from HP/Compaq?
ASKER CERTIFIED SOLUTION
Avatar of pand0ra_usa
pand0ra_usa
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of David
Later versions of Drivelock WILL do full disk encryption, or it can be used more like a password to unlock unencrypted data.  It comes down to how you configure it.  Note that all encryption can be circumvented via a variety of techniques, that are best not named in a public forum.

The encrypted data can be accessed if the drive is connected to a system that is not using it ... and then this encrypted data can be decrypted.  But this is a standard weakness of any encryption technology that does not also use something like a passkey, fingerprint, or retinal scan.

Both drivelock and Biltocker can be defeated via social engineering.  there are plenty of people out there who will gladly reveal a password if a stranger gives them a convincing story :)
Dlethe, it sounds like you don't like encryption. What would you suggest?
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
dlethe, I did have one other question for you, you said "Note that all encryption can be circumvented via a variety of techniques, that are best not named in a public forum.". I used to be a CT (Cryptographer) in the Navy and I am curious as to what the various techniques are that can circumvent encryption (aside from social engineering which like you said fools people not hardware or software)?
Google can be a wonderful thing to find exploits, but I will not add to the knowledge base by mentioning any of them. Suffice to say, that there are techniques beyond brute force decryption and social engineering.   Some involve hardware,  others involve "circumvention" code.  Thinking outside of the box is helpful also.   I will throw you a bone, since this is well known.   Think about techniques that people used to crack DRM so you can copy "protected", movies, amazon kindles, itunes music; DVRs ...

Those technologies were listed as safe and secure also, and I admit that encryption was limited, but they are examples of outside-the-box thinking.  'nuff said.