What Makes Close Protection Unique? » TB Close Protection Operatives have to deal with a wide range of threats that many others who uti... AN APPEAL FOR THE INAUGURATION OF THE NATIONAL W... » A Diaspora Note to PDP, Other Political Parties, Civil Liberties Organisations, Churches, Mosques, N... World of tanks and Google invite you into a virtua... » World of Tanks and Google Invite You into a Virtual World! Imagine feeling the turret shake on a Cen... Blaxtair restrategise its relations with diverse ... » Over 5 years, the basic model has continuously evolved and many clients have chosen this solution to... Clavister patrners with major telecom firms to ... » Clavister has partnered with DataCom and Ruckus Wireless to build a large, secure and reliable WiFi ... AdaptiveMobile set to protect one fifth of worl... » DUBLIN & DALLAS: AdaptiveMobile has expanded to protect one fifth of the world’s mobile subscribers ... PILGRIMS TAKES ITS PLACE IN TOP 5% OF SECURITY COM... » LONDON: Security specialist Pilgrims Group Limited has officially been ranked in the top 5% of all t... PALFINGER establishes a joint venture for the Amer... » - FairWind Renewable Energy Services, LLC will service American wind energy plants - PALFINGER w... ATF Firearms: Advisory - scams using fraudulent ... » The Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) is advising the public to be aware of ... ARMED FORCE DAY FLAG RAISED ACROSS THE UK » The Armed Forces Day flag is flying high across the UK as celebrations begin ahead of the seventh an...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

London: Software engineers at data recovery leader Kroll Ontrack have developed a new technology that can drastically reduce the amount of time it takes to recover encrypted hard drives with a logical or physical failure – a key development in light of the growing number of cyber threats that are driving the adoption of encrypted drives. The company’s new automated decryption technology allows engineers to target only areas of the hard drive that have been used while also automating the decryption process – improving the typical industry recovery turn time dramatically.

 

A typical recovery project involving an encrypted drive can take up to five days to complete using traditional solutions. CA Technologies estimates IT downtime costs North American companies $26.5 billion per year, at an average cost of $42,000 per hour according to Gartner, Inc.

“Simply put, the longer a company is without its data, the more money it loses,” said Paul Le Messurier, data recovery operations manager, Kroll Ontrack. “We know our new ‘decryption-on-the-fly’ technology represents a true breakthrough for the data recovery industry because it can make a significant impact on a company’s ability to rebound from an IT outage or other potentially catastrophic events with minimal damage to the business.”

As with all encrypted drives, Kroll Ontrack works with customers to securely procure their network credentials. The technology then uses proprietary imaging software to target areas of the drive with user data rather than imaging the entire drive. It then uses automation technology to decrypt those areas, allowing Kroll Ontrack to begin the recovery process earlier and complete it faster. This entire process can cut turnaround time from days to hours.

The number of encrypted hard drives in use has steadily risen alongside an increase in cyber security threats that can expose critical personal and business information. Kroll Ontrack, for example, has seen the amount of recovery projects that involve encrypted hard drives more than double since 2009.