Solved

encryption of data at rest on server

Posted on 2016-09-14
6
71 Views
Last Modified: 2016-11-14
Hi experts,

What are there some solutions for encryption of data at rest (cost effective) besides bitlocker.
0
Comment
Question by:shpresa
  • 5
6 Comments
 
LVL 54

Expert Comment

by:McKnife
ID: 41798806
I see no point in naming softwares, when there are no requirements named :-)
->Are your systems GPT based or MBR
->Are they equipped with a TPM?
->Do you trust your own employees?

These 3 questions are very important when choosing such a software.
0
 

Author Comment

by:shpresa
ID: 41798863
THank you.

NO, i have a small company, and we have  a cloud solution (Armor). our servers our 2012 windows. THey are equipped with TPM. I m not sure if I have GPT or MBR.

We want to protect ourselves with encryption at rest from other technical users from our cloud provider and other breaches.
0
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 41799284
Let's revisit these 3 questions.
1 GPT/MBR - Win10 and Win8.1 use GPT by default, while win7 uses MBR. If you have win10/win8.1, then many encryptors will not work for you, including the popular freewares disk cryptor, veracrypt and truecrypt.
2 They have TPM modules? That's very fine. Then we can skip answering Q3 because with a TPM in place, you can protect against certain attack scenarios where employees use their own password to unlock the disk in order to manipulate it offline.

So please answer 1. What OS' do you use/plan to use in the near future?
0
Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

 
LVL 54

Expert Comment

by:McKnife
ID: 41799298
Sorry, I must have been blind, this is about server OS', you wrote. So on server OS', GPT would have been the standard for windows server 2012 and higher. If I remember correctly, 2008 R2 was still MBR.
[Edit: corrected GPT to MBR]
0
 
LVL 54

Expert Comment

by:McKnife
ID: 41801237
So... it's been a day. Could you answer that question about your current/future server OS' so that we can carry on, please?
0
 
LVL 54

Expert Comment

by:McKnife
ID: 41824884
shpresa, how are you doing?
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Manually Remove Symantec PGP DE 6 114
CA server migration from Windows 2003 to Windows 2012 R2 12 119
cryptolocker in a desktop 3 83
Is banking over coffee-shop wifi SAFE? 16 155
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question