Advertisement
  • Networking
  • Storage
  • Security
  • Mobility and Wireless
  • Applications
  • OS and Servers
  • Mid-sized Business
  • Green IT

Home | News | Insight | How-tos | Case studies | Interviews | Briefings | Reviews | Blog

Computer & Internet Security How-Tos

January 20, 09

How to assess laptop encryption products

TPM or not TPM

By Mel Backman, Infoworld (US)

The largest single type of security breach is the stolen or lost laptop, according to the Open Security Foundation, yet these computers are among the least protected of all IT assets. The costs of a data breach can be huge, including the loss of trade secrets, marketing plans, and other competitive information that could have long-term business damage, plus the immediate costs of having to notify people if their personal information was possibly at risk from the breach. Particularly in a recession, enterprise management can't afford to take these risks lightly.

There is a way for IT to protect those laptops and the confidential information they contain: encryption. Without the combination of password security and encryption, any halfway-competent hacker has no problem siphoning hard drive contents and putting it to nefarious use.

Advertisement

Perhaps the most important advantage of full disc encryption, though - beyond the peace of mind it gives your business's lawyers - is the "safe harbour" immunity that accrues under many data privacy regulations. For example, credit card disclosure rules don't apply to encrypted data, and even California's strict data-disclosure statute makes an exception for encrypted records - provided you can prove they're encrypted. That's trivial with full disc encryption but not so easy with partial encryption techniques, which depend on user education for safe operation.

A key challenge for IT in deploying encryption on its laptops is the sheer number of encryption options available. Some Windows Vista editions, as well as the forthcoming Windows 7, support Microsoft's built-in BitLocker encryption, and numerous third-party encryption products cover the range of mobile operating systems from XP through Windows 7, Linux, and Mac OS X. Encryption granularity is widely variable as well, ranging from protecting individual files to encrypting virtual discs to deploying fully armored, hardware-based full disc encryption. Prices range from free to moderately expensive.
If you've put off laptop data security due to perceived technical shortcomings or high costs, you need to take another look at the field - before you lose another laptop.

Maximum encryption protection possible: TPM

Ideally, you'll deploy the full-metal-jacket approach to laptop data protection: full disc encryption using the Trusted Platform Module (TPM) technology. If you can afford the cost, waste no time with inferior methods. All you need is a laptop containing a TPM security coprocessor and, optionally, an encryption-enabled hard drive from one of the major hard drive manufacturers.

The TPM is a chip soldered on to the laptop's motherboard, providing hardware-based device authentication, tamper detection, and encryption key storage. The TPM generates encryption keys, keeping half of the key information to itself, making it impossible to recover data from an encrypted hard drive apart from the computer in which it was originally installed. Even if an attacker gets the user's part of the encryption key or disc password, the TPM-protected drive's contents can't be read when connected to another computer. Further, the TPM generates a unique digital signature from the motherboard in which it's embedded, foiling attempts to move the TPM chip itself to another machine.

Jump to page : [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ]

close

Email this article to a friend or colleague:




PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

close
  • This article is now being printed.
close

What are your views on this subject? Use the form below to post a comment on this article up to 1000 characters.


Characters remaining:

close

Click below to add 'How to assess laptop encryption products' to your blog.



If you do not have a ComputerworldUK Account and would like to use this feature, please Register.

If you are a registered, logged-in user, this will post the title and first paragraph of this story to your blog to share with your readers.

What is this?

Comments received


Tristan Kromer said on Friday, 23 January 2009

I find this point curious. "Drive-based encryption closes all of TPM's loopholes", yes it does. But it also makes the TPM redundant. The upcoming TCG spec for FDE HDDs creates almost identical functionality on the HDD, so if you go this route, why use the TPM?

The only benefit I've heard from my customers (full disclosure: I'm a Full Disk Encryption vendor and our software also supports TPMs in the described manner http://FinallySecure.com) is to bind the hard drive to specific laptop. That has the benefit of preventing someone from making off with the HDD, but that person would also need your credentials. If they're able to steal your creds and your HDD, they'd probably take your whole laptop too.

So what do you get? Increased risk of data loss because now you have two single points of failure, the TPM chip and the HDD instead of just one, the HDD. So you'd better have key recovery.

There are a LOT of good reasons to use TPM chips, but I am skeptical this is one of them.

Tristan Kromer said on Friday, 23 January 2009

The Intel approach to TPMs is really interesting and will probably be dirt cheap for PC OEMs to add, but I'm curious if this will reduce the complexity of implementation and key storage. I'd be curious if anyone reading this can give a detailed accounting of where and how vPro will manage the keys. Anybody have an answer?

back to index | older article>>



Advertisement
Advertisement

WHITE PAPERS

Techworld topic pages