GuardianEdge Introduces White Paper on the FFIEC's IT Security Handbook

San Francisco - GuardianEdge Technologies Inc. has released a white paper examining the information security objectives set forth in the Federal Financial Institutions Examination Council's Information Security Booklet (FFIEC Handbook) and how enterprise encryption technology can assist financial institutions in complying with the data protection requirements of the Gramm-Leach-Bliley Act.Nearly 26,000 banks, credit unions and other depository financial institutions must adhere to strict federal guidelines for protecting privacy of and tracking access to customer information, or risk criminal and civil penalties.

Compliance with the FFIEC Handbook's data security requirements is a business-critical objective for financial institutions evaluated by examiners during regular institutional audits. Information security and network IT managers in these institutions are challenged daily with controlling the confidentiality, accessibility, integrity and accountability of financial and personal data records. Encryption is the fundamental enabling technology that enables institutions to prevent data exposure and achieve ongoing compliance with regulatory requirements.

Full hard disk encryption protects electronic information stored on computer hard drives from intruders, and it is the best way to safeguard sensitive data on computers that may be stolen, discarded or repurposed, according to Guardian. Enterprise-grade encryption solutions, such as GuardianEdge Encryption Anywhere Hard Disk, are especially valuable, the company claims, because they combine pre-boot access control and strong data protection with centralized management capabilities and detailed audit trails.

The white paper, titled "Encryption & the FFIEC IT Security Handbook," is available from the GuardianEdge Web site. To view this document, click on the URL below: http://www.guardianedge.com/white_papers/facilitating_glba_compliance.html.

 

Source: GuardianEdge Technologies Inc.

For reprint and licensing requests for this article, click here.
Security risk Data security Compliance Core systems
MORE FROM DIGITAL INSURANCE