Solved

pointsec PC

Posted on 2011-09-27
1
463 Views
Last Modified: 2012-05-12
Are there any security issues or potential weaknesses/misconfigurations when deploying full disc encryption (in this case pointsec PC) onto windows laptops? If so can you detail what could be checked to ensure any such weaknesses/misconfigurations arent evident. Or is it as simple as install as part of build process and then nothing can go wrong?
0
Comment
Question by:pma111
1 Comment
 
LVL 1

Accepted Solution

by:
carlpearson20151 earned 500 total points
ID: 36711706
We use PointSec for all our 32-bit laptops and haven't had any installation problems.  Over time we have run into people leaving then having to use an administrator account to access the laptop, and then there are the occassional virus infections (thank you end users), that have required using the recovery disk to decrypt the drive and the encrypt the drive.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you start your Windows 10 PC and got an "Operating system not found" error or just saw  "Auto repair for startup" or a blinking cursor with black screen. A loop for Auto repair will start but fix nothing.  You will be panic as there are no back…
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

806 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question