Aberdeen Group Data Loss Prevention Study Validates Growing Demand for CREDANT Technologies Intelligent Encryption

28 August 2008

Officials with CREDANT Technologies, the market leader in mobile data protection solutions, acknowledged today that its market research mirrors a recent study by Aberdeen Group that indicates more organizations have adopted a centrally managed, policy-centric, file-based data encryption strategy over full disk encryption to guard against data loss while ensuring the highest levels of business productivity.

As reported in Aberdeen’s benchmark study “Data Loss Prevention: Little Leaks Sink the Ship,” nearly twice as many best-in-class organizations currently use file-based encryption to protect against a growing concern, the inadvertent disclosure of sensitive data from trusted insiders.

“Our study indicated that the highest risk of data leakage is related to the endpoints, or to the behavior of the end-users at the endpoints,” said Derek E. Brink, vice president and research fellow for IT Security, Aberdeen. “Among organizations with top performance, the most effective strategies for preventing data loss include a combination of enabling technologies, including data discovery and classification; data monitoring and filtering; and encryption of data in use at the endpoints.”

CREDANT officials said the increasing market adoption of centrally managed, intelligent file-based encryption is further proof that a comprehensive data loss prevention (DLP) strategy has to protect data at rest with encryption at all endpoints, including USB drives.

“The Aberdeen study points out that while the top performing companies have achieved significantly better performance at protecting against malicious data loss incidents, their greatest challenge remains in preventing data loss caused by simple human error and by well-meaning employees trying to carry out their jobs,” said Michael Callahan, CREDANT senior vice president and CMO. “Policy-based, data-centric encryption protects against both types of threats in a single solution and is the leading approach taken for encryption as validated by this independent study. We continue to experience strong demand for our intelligent, centrally managed, file-based encryption approach to endpoint data protection, as organizations race to prevent reputation-damaging data breaches.”

Become a bobsguide member to access the following

1. Unrestricted access to bobsguide
2. Send a proposal request
3. Insights delivered daily to your inbox
4. Career development