Characteristics of an effective FDE solution and critical selection criteria, according to experts. Also see the companion article Full Disk Encryption Dos and Don’ts.Characteristics of an Effective FDE (Full Disk Encryption) SolutionAccording to IDC, a sister company to CSO’s publisher, an optimal FDE system should have the following characteristics:Centrally managed and controlledRapidly deployed and maintainedPolicy drivenCompletely transparent to the userEasily supported by help desk or IT personnelProvide support for removable mediaExpandable, allowing new managed encryption applications to be added, as neededExtensible, enabling organizations to add managed encryption to existing enterprise applicationsSelection CriteriaAccording to a presentation by Eric Leighninger, chief security architect at Allstate Insurance, selection criteria he used when choosing an FDE system included:Strong key managementStorage of encrypted keys separate from encrypted dataControlled views to keying material (separation of duties) Key recovery (onsite, offsite and disaster recovery) Interoperability with enterprise softwareSupport for removable mediaLow performance degradationBackground encryption processing capabilityFault tolerance (power outages or user shutdown does not affect encryption process) Support for suspend and hibernation statesCompliance with FIPS 140-2, a U.S. government computer security standard Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills IT Skills IT Skills news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe