Contact Information: Contact: Mary Van Zandt Trainer Communications (817) 561-6549 mvanzandt@trainercomm.com
Post-RSA 2008 Poll Shows Those in Security Industry Feel the Threat of Losing Sensitive Data on Mobile Devices Is Growing, But Feel They Are Getting Smarter About How They Prevent Breaches
Video Poll Identifies Encryption as the Number One Choice to Protect Data on Laptops, Smartphones, and External Media; Data Encryption Is Preferred Over Disk Encryption; and Ease of Use Is Paramount
| Quelle: CREDANT Technologies
DALLAS, TX--(Marketwire - April 30, 2008) - A two-day video poll of attendees conducted at
the RSA Conference held earlier this month in San Francisco was made
available today by CREDANT Technologies, the market leader in endpoint data
protection solutions. Results of the poll demonstrate that more executives
and those employed in the business of IT security believe the threat
against laptops and mobile endpoints is real and are arming themselves
against data loss -- and with a vengeance!
The informal poll conducted by an independent video camera crew of 40+
randomly chosen show attendees, brought a clearer picture of the state of
security for data that becomes mobile. All were asked four questions on
camera: Is the threat against laptops and mobile endpoints real or hype,
what is needed to protect data, what type of encryption is needed, and how
can we make it more effective?
100% of those interviewed said the threat of data loss on laptops,
smartphones and external devices is real. While not terribly startling, the
next finding, that 90% of respondents now agree that encryption is a
necessity, demonstrates the steep learning curve that has taken place over
the last two years.
When asked what type of encryption is needed, most stated technologies that
secure the data, not simply the device. The security industry has become
much smarter over the last two years. When asked how encryption can be made
more effective, ease of use was named as the number one requirement
respondents look for in an encryption solution. In the words of one
respondent, "If it's not easy to use people won't use it and will find ways
to bypass it -- then everything is for naught." Participants in the video
poll agree: the threat is real, encryption works, data over disk
encryption, and it has to be easy to deploy and use.
To learn more about CREDANT Technologies and to view the video highlighting
concerns and views on endpoint data protection shared by RSA 2008
attendees, you can go to www.credant.com.
About CREDANT Technologies
CREDANT Technologies is the market leader in endpoint data protection
solutions. CREDANT's data security solutions preserve customer brand and
reduce the cost of compliance, enabling business to "protect what matters."
CREDANT Mobile Guardian is the only centrally managed endpoint data
protection solution providing strong authentication, intelligent
encryption, usage controls, and key management for data recovery. By
aligning security to the type of user, device and location, CREDANT ensures
the audit and enforcement of security policies across all computing
endpoints. Strategic partners and customers include leaders in finance,
government, healthcare, manufacturing, retail, technology, and services.
CREDANT was selected by Red Herring as one of the top 100 privately held
companies and top 100 Innovators for 2004, and was named Ernst & Young
Entrepreneur Of The Year 2005. Austin Ventures, Menlo Ventures, Crescendo
Ventures, Intel Capital, and Cisco Systems are investors in CREDANT
Technologies. For more information, visit www.credant.com.
CREDANT Technologies, CREDANT, the CREDANT Technologies logo, and the "Be
Mobile. Be Secure." tagline are registered trademarks of CREDANT
Technologies, Inc.