Mobile computing has quickly emerged for increasing user productivity. However, the portable nature of these devices increases the possibility for loss or theft. Consequent exposure of sensitive data can result in financial loss, legal ramifications and brand damage. PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft and Apple Mac OS X systems, enabling fast, cost-effective protection for data on desktops, laptops and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security for intellectual property, customer and partner data, and corporate brand equity. PGP Whole Disk Encryption protects data without changing the user experience, and automatically enforces data protection with centrally managed policies. Not only is full disk encryption achieved using the existing infrastructure, but operational costs are reduced from centrally automating encryption policies.
In a 2010 encryption tools Group Test in SC Magazine, PGP Whole Disk Encryption 9.10 achieved top marks across all testing categories, receiving accolades for the product's easy-to-use nature and extensive documentation. SC Magazine stated, “PGP is an industry leader and this product is a great value for the money.” As a PGP Encryption Platform-enabled application, PGP Whole Disk Encryption can be used with PGP Universal Server to manage existing policies, users, keys and configurations, expediting deployment and policy enforcement. The tool can also be used in combination with other PGP encryption applications to provide multiple layers of security. PGP Whole Disk Encryption is also available through a managed services provider (MSP) network worldwide. Customers are provided with the same PGP Data Protection with no up-front capital investment and no incremental load on IT resources.
The PGP Encryption Platform enables organizations to address immediate needs and continue to proactively deploy encryption applications without burdening administrators with multiple interfaces or distracting end-users with new training requirements. This approach enables IT to develop a proactive encryption strategy to mitigate risks before they affect operations or threaten the corporate brand and reputation.