
{"id":2511,"date":"2013-07-01T00:00:00","date_gmt":"2013-07-01T00:00:00","guid":{"rendered":"http:\/\/otava.test\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/"},"modified":"2013-07-01T00:00:00","modified_gmt":"2013-07-01T00:00:00","slug":"decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/","title":{"rendered":"Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level"},"content":{"rendered":"<p>After deep dives into the world of encryption as it relates to <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">privacy, security and compliance<\/a> and how it functions at the <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">software level<\/a>, Online Tech\u2019s \u201cTuesday at 2\u201d webinar series concluded its three-part encryption presentation with a look at <a href=\"https:\/\/www.onlinetech.com\/events\/encryption-at-the-hardware-and-storage-level\">encryption at the hardware and storage levels<\/a>.<\/p>\n<p>Online Tech\u2019s Systems Support Manager Steve Aiello led the conversation and handled aspects of encryption for Microsoft-driven hardware and guest co-host Mark Stanislav of Duo Security took over for the Linux-focused stretch of the presentation. Both explored the variety of places encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ.<\/p>\n<p>To wrap up the presentation, Aiello covered encryption options for storage media.<\/p>\n<p>What follows is a brief recap of their presentation. If you want to learn more, slides and a video replay of the 57-minute presentation are available <a href=\"https:\/\/www.onlinetech.com\/events\/encryption-at-the-hardware-and-storage-level\">here<\/a>. The slides offer numerous links to suggested reading from Aiello.<\/p>\n<p>While handling a look at both its Encrypting File Systems (EFS) and BitLocker disk encryption offerings, Aiello noted that \u201cMicrosoft has generally done a very good job at implementing cryptography in their ecosystem.\u201d<\/p>\n<p>EFS uses AES, a very strong encryption algorithm, to encrypt data at rest on a hard disk. Aiello covered its pros, cons and other highlights; described how it functions and how to enable it.<\/p>\n<p>\u201cThe really nice thing about EFS is that it\u2019s completely built into the Windows NT file system,\u201d Aiello said. \u201cThere\u2019s no extra you have to add, there\u2019s no performance hit, and it\u2019s a very safe option \u2013 as long as you can keep the username and password to that laptop or device private.\u201d<\/p>\n<p>Aiello also covered BitLocker, which he called \u201cMicrosoft\u2019s answer to full-disk encryption.\u201d It allows for a customizable level of protection depending on the combination of features used: The Trusted Platform Module (TPM) allows the system to verify the integrity of data, a PIN offers authentication and a USB Key offers two-factor authentication.<\/p>\n<p>\u201cOne of the really great things you can do with a full-disk encryption solution is \u2026 do a secure wipe,\u201d Aiello said. That ensures you properly \u201csanitize\u201d drives that may have once held sensitive healthcare of financial data, for instance, on them.<\/p>\n<p>Stanislav took over the Linux disk encryption portion of the event, covering Linux Unified Key Setup (LUKS) and the free, open-source TrueCrypt. He cautioned that while there are parallels to Windows in terms of what the Linux options can do, because Active Directory is the standard in how to manage systems within the scope of a deployment, Linux is not as direct in trying to manage encrypted systems as it would under Windows.<\/p>\n<p>That said, he noted that LUKS \u2013 despite its name \u2013 is usable with Windows using FreeOTFE software. Most commonly used for enterprise deployment, LUKS is flexible to utilize and allows you to select algorithms, key size and mode of operation for encryption.<\/p>\n<p>Perhaps more familiar to the general public is TrueCrypt, which offers a graphical user interface or command line functionality. As a stand-alone software application, it is stronger and more feature-rich out of the box than other options.<\/p>\n<p>Another highlight of TrueCrypt, said Stanislav, is that it offers the ability to completely hide volumes of data on hardware. \u201cEven if somebody stole a laptop, they wouldn\u2019t know there\u2019s a volume of encrypted data on the device,\u201d he said.<\/p>\n<p>The storage portion of the presentation covered self-encrypting drives (SEDs) and appliances for array-based encryption.<\/p>\n<p>Self-encrypting drives are hard drives that have encryption hardware built in that is completely transparent to the user and comes with software to generate a unique encryption key. Relatively new to the market, these drives come in a limited number of types and sizes.<\/p>\n<p>Aiello also covered numerous encryption appliances that can be built into the storage array that leaves data encrypted on the disk. These options have little performance impact, no drive choice limitations and zero key management issues, but can be expensive.<\/p>\n<p>After a jam-packed, four-presentation schedule in June, the \u201cTuesday at 2\u201d <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">webinar<\/a> series takes a couple weeks off before returning on July 16 for Why is it So Hard to Secure a Company, presented by High Bit Security COO Adam Goslin. For details and to register for that free educational session, click <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/why-is-it-so-hard-to-secure-a-company-security-expert-answers-tuesday\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After deep dives into the world of encryption as it relates to privacy, security and compliance and how it functions at the software level, Online Tech\u2019s \u201cTuesday at 2\u201d webinar series concluded its three-part encryption presentation with a look at encryption at the hardware and storage levels. Online Tech\u2019s Systems Support Manager Steve Aiello led the conversation and handled aspects of encryption for Microsoft-driven hardware and guest co-host Mark Stanislav of Duo Security took over for the Linux-focused stretch of the presentation. Both explored the variety of places encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. To wrap up the presentation, Aiello covered encryption options for storage media. What follows is a brief recap of their presentation. If you want to learn more, slides and a video replay of the 57-minute presentation are available here. The slides offer numerous links to suggested reading from Aiello. While handling a look at both its Encrypting File Systems (EFS) and BitLocker disk encryption offerings, Aiello noted that \u201cMicrosoft has generally done a very good job at implementing cryptography in their ecosystem.\u201d EFS uses AES, a very&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2511","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level\" \/>\n<meta property=\"og:description\" content=\"After deep dives into the world of encryption as it relates to privacy, security and compliance and how it functions at the software level, Online Tech\u2019s \u201cTuesday at 2\u201d webinar series concluded its three-part encryption presentation with a look at encryption at the hardware and storage levels. Online Tech\u2019s Systems Support Manager Steve Aiello led the conversation and handled aspects of encryption for Microsoft-driven hardware and guest co-host Mark Stanislav of Duo Security took over for the Linux-focused stretch of the presentation. Both explored the variety of places encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. To wrap up the presentation, Aiello covered encryption options for storage media. What follows is a brief recap of their presentation. If you want to learn more, slides and a video replay of the 57-minute presentation are available here. The slides offer numerous links to suggested reading from Aiello. While handling a look at both its Encrypting File Systems (EFS) and BitLocker disk encryption offerings, Aiello noted that \u201cMicrosoft has generally done a very good job at implementing cryptography in their ecosystem.\u201d EFS uses AES, a very...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-01T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level\",\"datePublished\":\"2013-07-01T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/\"},\"wordCount\":738,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/\",\"url\":\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/\",\"name\":\"Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-07-01T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/","og_locale":"en_US","og_type":"article","og_title":"Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level","og_description":"After deep dives into the world of encryption as it relates to privacy, security and compliance and how it functions at the software level, Online Tech\u2019s \u201cTuesday at 2\u201d webinar series concluded its three-part encryption presentation with a look at encryption at the hardware and storage levels. Online Tech\u2019s Systems Support Manager Steve Aiello led the conversation and handled aspects of encryption for Microsoft-driven hardware and guest co-host Mark Stanislav of Duo Security took over for the Linux-focused stretch of the presentation. Both explored the variety of places encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. To wrap up the presentation, Aiello covered encryption options for storage media. What follows is a brief recap of their presentation. If you want to learn more, slides and a video replay of the 57-minute presentation are available here. The slides offer numerous links to suggested reading from Aiello. While handling a look at both its Encrypting File Systems (EFS) and BitLocker disk encryption offerings, Aiello noted that \u201cMicrosoft has generally done a very good job at implementing cryptography in their ecosystem.\u201d EFS uses AES, a very...","og_url":"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/","og_site_name":"OTAVA","article_published_time":"2013-07-01T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level","datePublished":"2013-07-01T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/"},"wordCount":738,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/","url":"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/","name":"Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-07-01T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2511"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2511\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2511"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}