Security Line Card
  • Security Line Card
  • Security Vendor Landscape
  • Security Webinars
  • Line Cards...
    • Cloud Security Line Card
    • DC/POS Line Card ↗
    • Emerging Business Group
    • IoT Line Card ↗
    • Smart Surveillance and Security Line Card ↗
    • Services Line Card
    • Security Services Line Card
    • UCC Line Card ↗
  • Resources...
    • 2021 Key Trends
    • Ask an Expert Wednesdays
    • Business Transformation Center (BTC)
    • Digital Transformation Playbooks ↗
    • Financial Solutions ↗
    • Ingram Webinars & Events ↗
    • News & Updates >
      • COVID-19 Resources
      • SolarWinds Sunburst Attack
      • Work From Anywhere
    • NIST Cyber Security Framework
    • ONE Sales Tool ↗
    • Professional & Training Security Services
    • Security Business Unit
    • ​Solution Design and Services

Encryption
​(Data & Device)

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Types of Endpoint Encryption

​Whole/Full Disk Encryption

Only encrypts data when HDD is powered down and user is not logged into the system.
Works well for mobile laptops, useless for always on servers.

​File/Folder

Keys are required to view un-encrypted files.
Great for securing sensitive information that will be shared across users or networks.

What data needs to be encrypted?​

Data which must be handled securely, using encryption where pertinent, includes:
Any personal data classed as "sensitive" by the Data Protection Act. See Key definitions of the Data Protection Act.
Any data, that is not in the public domain, about a significant number of identifiable individuals.
Personal data in any quantity where its protection is justified because of the nature of the individuals, source of the information, or extent of the information.
View Encryption solutions on our security line card
Vendor Landscape
Security Services

Webinars
2021 Key Trends
Site Feedback​
Picture
Copyright © 2021 Ingram Micro. All rights reserved
  • Security Line Card
  • Security Vendor Landscape
  • Security Webinars
  • Line Cards...
    • Cloud Security Line Card
    • DC/POS Line Card ↗
    • Emerging Business Group
    • IoT Line Card ↗
    • Smart Surveillance and Security Line Card ↗
    • Services Line Card
    • Security Services Line Card
    • UCC Line Card ↗
  • Resources...
    • 2021 Key Trends
    • Ask an Expert Wednesdays
    • Business Transformation Center (BTC)
    • Digital Transformation Playbooks ↗
    • Financial Solutions ↗
    • Ingram Webinars & Events ↗
    • News & Updates >
      • COVID-19 Resources
      • SolarWinds Sunburst Attack
      • Work From Anywhere
    • NIST Cyber Security Framework
    • ONE Sales Tool ↗
    • Professional & Training Security Services
    • Security Business Unit
    • ​Solution Design and Services