Disk Encryption Software

Disk encryption software is computer security software used to prevent unauthorized access to data storage. It protects data confidentiality stored on a storage device such as a hard disk or solid state drive (SSD) by using disk encryption. Encrypted data, also known as ciphertext, is information that has been encoded and can only be accessed with the correct encryption key. Data encryption is used to discourage stealing sensitive computer data.

Disk encryption types

There are a couple types of disk encryption that differ in how data is secured:

  • Full-disk encryption: Not unlike the protection of your home it applies encryption to the entire hard drive including swap and hidden files without user intervention. However, full-disk encryption does not protect files that are sent via email or copied to a memory stick or otherwise transferred. When this happens, they are no longer encrypted.

  • File-level encryption: It protects specific files that are manually encrypted. File-level encryption offers role-based access controls that allow for more granular access based on the role a worker has within their organization. It depends on the user to perform a manual action to make sure files are encrypted before storage or transfer.

File-level encryption can be used in conjunction with full-disk encryption. This is beneficial for manually encrypting the files that need to be shared within an organization that lose encryption with a full-disk deployment.

Disk encryption software providers

In choosing a disk encryption solution, consider the ease of managing and recovering encryption keys, if the product is compatible with your applications and infrastructure, what platforms and operating systems are supported, and if you want software that does more than disk encryption, such as handling removable and network-attached storage (NAS). Here are some popular disk encryption software providers:

  • Apple FileVault 2
  • VeraCrypt
  • Check Point SandBlast Agent
  • Bitlocker – included with the Windows operating system
  • Eset Endpoint Encryption Pro

Abby Braden
Abby Braden
Abby Braden is an award-winning writer and editor for websites such as TechnologyAdvice.com, Webopedia.com, and Project-Management.com, where she covers technology trends and enterprise and SMB project management platforms. When she’s not writing about technology, she enjoys giving too many treats to her dog and coaching part-time at her local gym.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...