When you hear “Dynamic Duo”, what comes to mind first? Batman & Robin, Thelma & Louise, Mario & Luigi?
If you’re a data security expert, there’s a good chance you thought Utimaco’s LAN Crypt File and Folder Encryption & Enterprise Secure Key Manager (ESKM). Although these are two leading data security solutions, they haven’t fought side-by-side for data security… until now.
Meet Our Data Security Heroes
Before discussing why these products are better together, here is a quick introduction to the products:
- Utimaco LAN Crypt File and Folder Encryption is software that protects business-critical data from unauthorized internal and external access by encrypting data and controlling access on client devices. This ensures that data is always encrypted on devices and remains encrypted wherever the data is emailed, stored, or backed up.
- Utimaco Enterprise Secure Key Manager (ESKM) is at the heart of an organization's key management strategy. It provides secure storage and a single pane of glass for all cryptographic keys across various environments, whether on-premises or in the cloud. ESKM meets the most stringent compliance requirements with hardened physical or virtual appliances built on a FIPS-compliant architecture.
The Dynamic Duo’s Mission
Protecting files is challenging, and failing to do so is costly; the average global breach cost is $4.88 million, while in the United States, it is $9.36 million.
Data is spread across cloud providers and backup services, shared among users, and stored on-premises. To further complicate the problem, there are IT and Cloud Administrators who have superuser powers, granting them privileges to access and read all their organization's data. Additionally, there are regulators and auditors that you must prove to meet their list of compliance and data protection regulations.
The mission is to protect data in files and folders:
- Everywhere (cloud, on-premises, and on devices)
- Prevent Admin super user powers from seeing the data without impeding their ability to do their jobs
- Manage centralized policies to authorize access
- Create and store encryption keys in a device that meets compliance requirements
- Separate encryption keys from the data
This mission must be completed transparently to users and delivered with centralized, easy-to-use key management for administrators. The end goal is to protect files to prevent financial and reputational damage that could be caused if they were to be exfiltrated by cyber-villains.
Understand Their Data Protection Superpowers
LAN Crypt File and Folder Encryption transparently encrypts file and folder data on the user’s device before it is transmitted or stored in the cloud or on-premises, such as a data center server or user device. This ensures that only the user who holds the encryption keys can decrypt the data, preventing service providers or third parties, such as Admins, from viewing the unencrypted content. It enhances privacy, security, and compliance with data protection regulations by keeping sensitive data secure from unauthorized access. Users can quickly define access policies and securely store and share files from their devices.
ESKM offers the strongest key storage capabilities, as it is designed to meet FIPS 140-2 security standards, ensuring compliance with stringent requirements. Key management is simplified by being centralized in on-premises hardware or a virtual appliance. It also plays a vital role in keeping encryption keys separate from data in the cloud.
Securing Data Better Together
Working together, LAN Crypt File and Folder Encryption and ESKM maximize data security and minimize key management effort. This enables IT to provide users with the ability to encrypt data and transfer it across various cloud providers, backup services, and on-premises storage without the data ever being in clear text.
Now, ESKM easily integrates with LAN Crypt File and Folder Encryption, providing centralized key storage and management for client-side encryption keys. Users can manage all file and folder encryption keys across all clients through a single pane of glass throughout their entire lifecycle. The centralized key management extends far beyond the client-side use case. The same deployment can manage all other encryption keys used on-premises and in cloud environments. Data, wherever it resides, is reliably secured as the encryption keys are centrally stored within ESKM, ensuring they are separated from the data in cloud environments. ESKM also provides reliable policy and access controls, ensuring that keys are secured against unauthorized access, including at the appliance level.
Become a Data Protection Hero
Try LAN Crypt File and Folder Encryption for free for 30 days to experience the power of client-side encryption data protection firsthand! If you need a little help, like Batman has Alfred and Spider-Man has Aunt May, you can always contact Utimaco for sage advice on data security.