ZoneAlarm DataLock review
Can what is largely a consumer tool offer any value to business users? We review ZoneAlarm DataLock to find out.
It's not every day that a major company, government department or other large organisation loses a laptop stuffed with valuable data, but it sometimes feels like it.
Encrypting data is one obvious solution for mitigating the effects of such enormous privacy disasters and Check Point has launched an inexpensive software package designed to do just that. Small businesses and consumers can now use the sort of features that big companies have had access to (but frequently seem to ignore) for years.
Why is it necessary to buy third-party encryption when Windows has been capable of encoding files for over a decade? Because, whether you are still using Windows XP or any of the newer releases, encryption is only available in certain editions. ZoneAlarm DataLock aims to fill the hole left by Microsoft when it chose to exclude encryption from all versions of Windows 7 below the Professional edition.
The most expensive editions of Windows 7 include two main types of encryption. The Encrypted File System (EFS) lets you encrypt specific files and folders, while BitLocker encrypts entire hard disks and (using BitLocker To Go) flash drives. BitLocker also includes management features that make it possible for IT managers to recover keys and to ensure that certain types of data are always encrypted.
EFS is available in Windows 7 Professional, Enterprise and Ultimate, while BitLocker is only available in the latter two versions. Users of Windows Home Premium or lower need to install third-party encryption software if they want to protect files. This is where ZoneAlarm DataLock comes in.
In This Article
What you need to know about migrating to SAP S/4HANA
Factors to assess how and when to begin migrationDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
Testing for compliance just became easier
How you can use technology to ensure compliance in your organisationDownload now
Best practices for implementing security awareness training
How to develop a security awareness programme that will actually change behaviourDownload now