{"id":15123,"date":"2016-02-04T20:52:45","date_gmt":"2016-02-04T20:52:45","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5117"},"modified":"2019-11-15T06:59:20","modified_gmt":"2019-11-15T11:59:20","slug":"encryption-kes10","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/encryption-kes10\/15123\/","title":{"rendered":"Data encryption in Kaspersky Endpoint Security 10"},"content":{"rendered":"<p>Remember your school days when a teacher\u2019s dull mutter only made you sleepier not smarter? But you\u2019re not supposed to sleep during class, so some of us used to pester our classmates or \u2013 if you\u2019re sitting in the rear \u2013 play Sea Battle (or Battleship, or whatever it is called these days) or passed notes to friends.<\/p>\n<p>If a teacher was more into upholding discipline than dispersing knowledge, then a cipher of sorts was applied as a \u201csecurity measure\u201d \u2013 either it was a slang only understandable to a selected few, or swapping letters numerical positions in the alphabet. A few smarter ones could devise their own kind of ciphers.<\/p>\n<p>This is an old and popular means to protect data from prying eyes, well-rooted in history since ancient times. It is widely known that Caesar used a substitution cipher for his private correspondence; Leonardo Da Vinci wrote most of his personal notes in mirror, only using standard writing if he intended his texts to be read by others.<\/p>\n<p>Much of today\u2019s\u00a0data, unlike classmates\u2019 notes, is worth a lot. And if we are to protect it, we can use an old and proven method, as adjusted for Moore\u2019s law: at least some of the encrypting algorithms considered to be among the strongest 10 years ago, can be\u00a0cracked today in a matter of ten minutes.<\/p>\n<p>Today,\u00a0we can cipher not just one document, but entire archives and data storage media, both stationary and removable. And we don\u2019t need to build Enigma for it: Kaspersky Endpoint Security 10 <a href=\"http:\/\/support.kaspersky.com\/9382\" target=\"_blank\" rel=\"noopener\">has done it for you already<\/a>.<\/p>\n<p>The first steps are:<\/p>\n<ol>\n<li>Download Data Encryption module [available only in Advanced \u0438 Total\u00a0editions]<\/li>\n<li><a href=\"http:\/\/support.kaspersky.com\/9383\" target=\"_blank\" rel=\"noopener\">Install it<\/a><\/li>\n<li>Set up encryption policy<\/li>\n<li>Allow access for\u00a0the selected users.<\/li>\n<\/ol>\n<p>File Encryption would require authorization only when\u00a0accessing the file. If disks or removable drives are being encrypted, no file would be accessible without entering a login ID and password. So, if the PC or flash drive are\u00a0lost or stolen, no one will be able to copy or read the encrypted data they contain.<\/p>\n<p>More data about <a href=\"http:\/\/support.kaspersky.com\/kes10wks\/encryption\" target=\"_blank\" rel=\"noopener\">setting up Data Encryption<\/a> and other capabilities of our products are available in the <a href=\"http:\/\/support.kaspersky.com\/\" target=\"_blank\" rel=\"noopener\">Kaspersky Lab\u2019s Knowledge Base<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Endpoint Security 10 can cipher not just one document, but entire archives and data storage media, both stationary and removable.<\/p>\n","protected":false},"author":674,"featured_media":15317,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[261,2387],"class_list":{"0":"post-15123","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-encryption","10":"tag-kaspersky-endpoint-security-10"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/encryption-kes10\/15123\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/encryption-kes10\/15123\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/encryption-kes10\/15123\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/encryption\/","name":"encryption"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15123"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15123\/revisions"}],"predecessor-version":[{"id":30335,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15123\/revisions\/30335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15317"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}