Educause Security Discussion mailing list archives
Re: FW: CyberAngel
From: Gary Dobbins <dobbins () ND EDU>
Date: Fri, 6 Oct 2006 10:45:09 -0400
One shortcoming of folder-oriented crypto is that swap space and temp files might end up containing sensitive data. -----Original Message----- From: "Mayne, Jim" <J.Mayne () TCU EDU> To: SECURITY () LISTSERV EDUCAUSE EDU Sent: 10/6/06 10:26 AM Subject: Re: [SECURITY] FW: CyberAngel Connie, I am curious what your thoughts are of the folder type encryption vs. the full disk encryption since you are expanding the use of CyberAngel? We are grappling with this issue ourselves. Also what about TPM integration? Thanks for the thoughts, Jim Jim Mayne Network Security Engineer Texas Christian University j.mayne () tcu edu (817) 257-6843 ________________________________ From: Sadler, Connie [mailto:Connie_Sadler () BROWN EDU] Sent: Thursday, October 05, 2006 3:19 PM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: Re: [SECURITY] FW: CyberAngel We use it here and are expanding its use. It works very well for us. The support is simply outstanding. Cyberangel support staff provide support for every individual user - 7x24 - so it's no impact to our Help Desk. And they help with documentation, etc. - service is the best. I would highly recommend it. Connie J. Sadler, CM, CISSP, CISM, GIAC GSLC IT Security Officer Brown University Box 1885, Providence, RI 02912 Connie_Sadler () Brown edu <mailto:Connie_Sadler () Brown edu> Office: 401-863-7266 ________________________________ From: clementz.7 [mailto:clementz.7 () OSU EDU] Sent: Thursday, October 05, 2006 4:16 PM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: Re: [SECURITY] FW: CyberAngel Although we don't personally use it I have tested it and it seems great from a data protection standpoint. The University of Toledo uses it for both they may have some insight. Todd Clementz Systems Administrator Knowlton School of Architecture The Ohio State University 614.292.8544 ________________________________ From: Mclaughlin, Kevin L (mclaugkl) [mailto:mclaugkl () UCMAIL UC EDU] Sent: Thursday, October 05, 2006 4:06 PM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: [SECURITY] FW: CyberAngel ________________________________ From: Logan, Kimberly (loganks) Sent: Thursday, October 05, 2006 3:49 PM To: security () listserv educause edu Subject: CyberAngel Hi, The University of Cincinnati is looking at CyberAngel as an asset recovery/data protection solution. I was wondering if anyone uses it and what are your experiences? Have you found it to be both asset recovery and data protection, or just asset recovery? How widely do you use it? Do any of you use any of it's competitors? Thanks in advance for any input you have. Kim Kim Logan Information Security Officer University of Cincinnati (513)556-9070 kim.logan () uc edu
Current thread:
- FW: CyberAngel Mclaughlin, Kevin L (mclaugkl) (Oct 05)
- <Possible follow-ups>
- Re: FW: CyberAngel clementz.7 (Oct 05)
- Re: FW: CyberAngel Sadler, Connie (Oct 05)
- Re: FW: CyberAngel Roger Safian (Oct 05)
- Re: FW: CyberAngel Faloba,Jodi L (Oct 06)
- Re: FW: CyberAngel Mayne, Jim (Oct 06)
- Re: FW: CyberAngel Gary Dobbins (Oct 06)
- Re: FW: CyberAngel Sadler, Connie (Oct 06)