Educause Security Discussion mailing list archives

Re: FW: CyberAngel


From: Gary Dobbins <dobbins () ND EDU>
Date: Fri, 6 Oct 2006 10:45:09 -0400

One shortcoming of folder-oriented crypto is that swap space and temp files might end up containing sensitive data.

-----Original Message-----
From: "Mayne, Jim" <J.Mayne () TCU EDU>
To: SECURITY () LISTSERV EDUCAUSE EDU
Sent: 10/6/06 10:26 AM
Subject: Re: [SECURITY] FW: CyberAngel

Connie,
  I am curious what your thoughts are of the folder type encryption vs.
the full disk encryption since you are expanding the use of CyberAngel?
We are grappling with this issue ourselves. Also what about TPM
integration?
 
Thanks for the thoughts,
 
Jim
 
Jim Mayne 
Network Security Engineer 
Texas Christian University 
j.mayne () tcu edu 
(817) 257-6843 
 

________________________________

From: Sadler, Connie [mailto:Connie_Sadler () BROWN EDU] 
Sent: Thursday, October 05, 2006 3:19 PM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] FW: CyberAngel


 
We use it here and are expanding its use. It works very well for us. The
support is simply outstanding. Cyberangel support staff provide support
for every individual user - 7x24 - so it's no impact to our Help Desk.
And they help with documentation, etc. - service is the best. I would
highly recommend it.

Connie J. Sadler, CM, CISSP, CISM, GIAC GSLC 
IT Security Officer
Brown University Box 1885, Providence, RI 02912
Connie_Sadler () Brown edu <mailto:Connie_Sadler () Brown edu> 
Office: 401-863-7266


 

________________________________

From: clementz.7 [mailto:clementz.7 () OSU EDU] 
Sent: Thursday, October 05, 2006 4:16 PM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] FW: CyberAngel



Although we don't personally use it I have tested it and it seems great
from a data protection standpoint.  The University of Toledo uses it for
both they may have some insight.  

 

Todd Clementz

Systems Administrator

Knowlton School of Architecture

The Ohio State University

614.292.8544

________________________________

From: Mclaughlin, Kevin L (mclaugkl) [mailto:mclaugkl () UCMAIL UC EDU] 
Sent: Thursday, October 05, 2006 4:06 PM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] FW: CyberAngel

 

________________________________

From: Logan, Kimberly (loganks) 
Sent: Thursday, October 05, 2006 3:49 PM
To: security () listserv educause edu
Subject: CyberAngel 

Hi,

 

The University of Cincinnati is looking at CyberAngel as an asset
recovery/data protection solution.  I was wondering if anyone uses it
and what are your experiences?  Have you found it to be both asset
recovery and data protection, or just asset recovery?  How widely do you
use it?  Do any of you use any of it's competitors? 

 

Thanks in advance for any input you have.

 

Kim

 

Kim Logan

Information Security Officer

University of Cincinnati

(513)556-9070

kim.logan () uc edu

 

Current thread: