Disk Encryption Software

Disk encryption software is computer security software used to prevent unauthorized access to data storage. It protects data confidentiality stored on a storage device such as a hard disk or solid state drive (SSD) by using disk encryption. Encrypted data, also known as ciphertext, is information that has been encoded and can only be accessed with the correct encryption key. Data encryption is used to discourage stealing sensitive computer data.

Disk encryption types

There are a couple types of disk encryption that differ in how data is secured:

  • Full-disk encryption: Not unlike the protection of your home it applies encryption to the entire hard drive including swap and hidden files without user intervention. However, full-disk encryption does not protect files that are sent via email or copied to a memory stick or otherwise transferred. When this happens, they are no longer encrypted.

  • File-level encryption: It protects specific files that are manually encrypted. File-level encryption offers role-based access controls that allow for more granular access based on the role a worker has within their organization. It depends on the user to perform a manual action to make sure files are encrypted before storage or transfer.

File-level encryption can be used in conjunction with full-disk encryption. This is beneficial for manually encrypting the files that need to be shared within an organization that lose encryption with a full-disk deployment.

Disk encryption software providers

In choosing a disk encryption solution, consider the ease of managing and recovering encryption keys, if the product is compatible with your applications and infrastructure, what platforms and operating systems are supported, and if you want software that does more than disk encryption, such as handling removable and network-attached storage (NAS). Here are some popular disk encryption software providers:

  • Apple FileVault 2
  • VeraCrypt
  • Check Point SandBlast Agent
  • Bitlocker – included with the Windows operating system
  • Eset Endpoint Encryption Pro

Abby Dykes
Abby Dykes
Abby Dykes is a newly-graduated writer and editor for websites such as TechnologyAdvice.com, Webopedia.com, and Project-Management.com. When she’s not writing about technology, she enjoys giving too many treats to her dog and coaching part-time at her local gym.

Top Articles

Huge List Of Texting and Online Chat Abbreviations

From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top...

How To Create A Desktop Shortcut To A Website

This Webopedia guide will show you how to create a desktop shortcut to a website using Firefox, Chrome or Internet Explorer (IE). Creating a desktop...

The History Of Windows Operating Systems

Microsoft Windows is a family of operating systems. We look at the history of Microsoft's Windows operating systems (Windows OS) from 1985 to present...

Hotmail [Outlook] Email Accounts

  By Vangie Beal Hotmail is one of the first public webmail services that can be accessed from any web browser. Prior to Hotmail and its...

Abacus Definition & Meaning

An abacus, also known as a counting frame, is a mechanical device used...

Legacy Code Definition &...

Legacy code refers to source code that has been inherited from a previous...

Unregulated Power Supply Definition...

An unregulated power supply is a system that transforms input voltage into direct...