dcsimg
Main » TERM » D »

Disk Encryption Software

Disk encryption software is computer security software used to prevent unauthorized access to data storage. It protects data confidentiality stored on a storage device such as a hard disk or solid state drive (SSD) by using disk encryption. Encrypted data, also known as ciphertext, is information that has been encoded and can only be accessed with the correct encryption key. Data encryption is used to discourage stealing sensitive computer data. 

Disk encryption types

There are a couple types of disk encryption that differ in how data is secured: 

  • Full-disk encryption: Not unlike the protection of your home—it applies encryption to the entire hard drive including swap and hidden files without user intervention. However, full-disk encryption does not protect files that are sent via email or copied to a memory stick or otherwise transferred. When this happens, they are no longer encrypted.

  • File-level encryption: It protects specific files that are manually encrypted. File-level encryption offers role-based access controls that allow for more granular access based on the role a worker has within their organization. It depends on the user to perform a manual action to make sure files are encrypted before storage or transfer.

File-level encryption can be used in conjunction with full-disk encryption. This is beneficial for manually encrypting the files that need to be shared within an organization that lose encryption with a full-disk deployment.

Disk encryption software providers

In choosing a disk encryption solution, consider the ease of managing and recovering encryption keys, if the product is compatible with your applications and infrastructure, what platforms and operating systems are supported, and if you want software that does more than disk encryption, such as handling removable and network-attached storage (NAS). Here are some popular disk encryption software providers:

  • Apple FileVault 2
  • VeraCrypt
  • Check Point SandBlast Agent
  • Bitlocker - included with the Windows operating system
  • Eset Endpoint Encryption Pro









LATEST ARTICLES
Texting & Chat Abbreviations

From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top... Read More »

Huge List of Computer Certifications

Have you heard about a computer certification program but can't figure out if it's right for you? Use this handy list to help you decide. Read More »

STUDY GUIDES
Computer Architecture Study Guide

Computer architecture provides an introduction to system design basics for most computer science students. Read More »

Network Fundamentals Study Guide

Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »

The Five Generations of Computers

Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »