Solved

encryption on machine

Posted on 2016-08-25
7
65 Views
Last Modified: 2016-08-25
what are benefits for encryption to run on machine? is it only applicable that someone does not read data without the encryption password.. so basically 2 layers of protection? (windows password, and encryption password)

could this affect performance windows programs?
would encryption happen only on writes? (continually)

considering if this is something to consider for a laptop that will be on road..

what could be disadvantages? like potential slowness on less resource machine etc?
0
Comment
Question by:25112
7 Comments
 
LVL 90

Assisted Solution

by:John Hurst
John Hurst earned 125 total points
Comment Utility
On a modern laptop, encryption does not hinder performance. The value, for a laptop on the road, is that the data is secure if the laptop is lost or stolen. That is the major benefit.
0
 
LVL 29

Assisted Solution

by:ScottCha
ScottCha earned 125 total points
Comment Utility
The benefits are that if the machine is lost or stolen or otherwise compromised, the data on the drive cannot be accessed.

This is definitely something you want on a laptop that is on the road.  Especially if sensitive customer data is on the machine.  This will protect the customer as well as yourself from possible legal action.

With the speed of systems now, you won't see much if any performance hit.  

Use BitLocker....comes with Microsoft Windows 10 Pro.
0
 
LVL 5

Author Comment

by:25112
Comment Utility
BitLocker
is that all it does? encrypt on write?
does read do a decrypt moment by moment too? or is only WRITE involved with the BitLocker tool?

does this have to do anything to do with backups? (scheduled or on-demand) {or put in another way, does this interfere with backups in anyways)
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 90

Assisted Solution

by:John Hurst
John Hurst earned 125 total points
Comment Utility
BitLocker encrypts on write and decrypts on read as it go.

Any backup has to be integrated with BitLocker.
0
 
LVL 61

Accepted Solution

by:
btan earned 250 total points
Comment Utility
Encryption is two layer whereby you protect the at disk level and file/folder level.
- Disk level: in event the HDD is stolen or lose (but cannot boot up w/o the password) - like Bitlocker
- File/Folder (or container) level: in event the of unauthorised login that bypass the disk but file/folder of user files remains encrypted. Like EFS or Veracrypt (container)

There is definitely additional resource to performance encryption but it is minimal impact with computing power and faster disk such as Solid State and event then there is no real experience of slowness using the traditional SATA, IDE or RAID. The more secure (longer key length), the more resource btu so far, on the fly access of the encrypted file are optimal and acceptable.

Con is to ensure recovery and backup is done and verified working. You be surprised one day you forget password and not able to recover or found those expected key to be corrupted. Part and parcel of using crypto and PKI..but it make you feel more assure with data encrypted. Some wanted portable encrypted container and run from any machine - that can be done provider you have admin right but this not quite impactful if you using your own machine most of the time.
0
 
LVL 5

Author Comment

by:25112
Comment Utility
thankuexperts..
0
 
LVL 90

Expert Comment

by:John Hurst
Comment Utility
You are very welcome and I was happy to help.
0

Featured Post

Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

Join & Write a Comment

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
The viewer will learn how to simulate a series of coin tosses with the rand() function and learn how to make these “tosses” depend on a predetermined probability. Flipping Coins in Excel: Enter =RAND() into cell A2: Recalculate the random variable…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now