Information Protection Technologies

Following is a table that recommends the most appropriate data protection technology that can be used to protect High Business Impact information while sharing it on different platforms:





BitLocker and BitLocker To Go™

Technology description Enables you to apply specific access permissions to documents, workbooks, and presentations to prevent unauthorized forwarding, printing, or copying; and to set expiration dates after which files no longer are available or usable. Enables you to encrypt and/or digitally sign your e-mail messages so that only the people you specify can access them. Encrypts your files or folders, and requires users other than you to enter the appropriate decryption key before they can access the encrypted content. Protects data on your computer by preventing unauthorized access to the hard disk drive
Transmit with internal e-mail Acceptable solution Preferred solution    
Transmit with external e-mail   Preferred solution    
Share by using SharePoint Preferred solution      
Share by using Sharepoint Workspaces Preferred solution      
Storing on a computer New hardware running Windows Vista® or newer Acceptable solution   Acceptable solution Preferred solution
Storing on a computer Old hardware running Windows Vista or older Preferred solution   Acceptable solution  
Storing on removable mediaUse Windows 7 or Windows Server® 2008 R2     Acceptable solution Preferred solution

For more information and recommendations on How to Secure Business Information, download the Securing Business Information Work Smart Guide from Microsoft IT.


Leave a Comment

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s