Dell adds hardware encryption to Latitude laptops
By Simon Aughton
Posted on 17 Sep 2007 at 11:11
Dell has introduced hardware-based data encryption technology that it claims makes its Latitude notebook computers the "world's most secure laptops".
The company claims the combination of the hardware-based encryption offered by Seagate's Momentus HDD, and Wave Systems' Embassy software is an industry-first. Dell claims its encryption is both faster and more secure than software-only solutions.
"Dell is at the forefront of notebook security because it ranks as a top concern for customers in an environment where more data is produced by an increasingly mobile work force," says Margaret Franco, director, Dell Product Group. "The industry-first solution we're announcing today adds to our multi-pronged approach to security that delivers an ironclad assurance of protection."
Administrators can securely manage encrypted drives, set up and recover passwords, manage users and deploy pre-boot authentication using the bundled software. It also enables IT departments to quickly ascertain that all data on a lost or stolen laptop was safely encrypted.
Is your business a social business? For helpful info and tips visit our hub.
- 20 years of PC Pro: our greatest review mistakes
- 20 years of PC Pro: our first A-List
- Wikipedia's "right to be forgotten" protest hits the wrong note
- 3D printing hits the high street for plastic selfies
- 20 years of PC Pro: What amazed us in our first issue
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Windows Easy Transfer – not so "easy" in Windows 8.1
- Formula 1: what a difference virtualisation makes
- Office of the future: comfy chairs and tablets everywhere
- 10 ways to make your business more secure
- Top five VoIP mistakes
- How to add in-app purchasing to an iPhone, Android or Windows app
- Remote-control ransomware: TeamViewer and software hardball
- Why laptops with serial ports matter to the Internet of Things
- Make your mobile battery last longer
- Small steps into handling Big Data
- Nexus 5: does it really run stock Android?
- How to get broadband to a garden office
- How to write your company's IT security policy