You are viewing a single comment's thread.

view the rest of the comments →

0
0

[–] zeitsieben ago 

At my work, directors use Symantec Full Disk Encryption. The OS itself is encrypted, but not the bootloader so, theoretically, you can at least read what's going on under the table (I have no idea how one would do that). There's a master key in the administration system, so if someone knows it, they have the keys to the kingdom and can modify every single computer that uses it that's inserted in the domain.

The laptops run VERY slowly; 5400RPM hard drives are virtually unusable if you want to do anything (I'm talking about 7+ minutes boot time). Trust me, you need an SSD to run that. Also, they're prone to bootloader corruption, and if that happens, we decrypt it with the master key and a software called BartPE. After decrypting, the OS always corrupted itself somehow and I don't know if that's intended (well, must be), so you have to use that program to copy whatever data you have in the hard drive to a external storage. It's a necessary evil to us.

0
0

[–] e0steven ago 

Or maybe the Symantec product is crap? Their antivirus is horrendous

0
0

[–] zeitsieben ago  (edited ago)

Well, I wouldn't say that. Their antivirus provides us with a centralized administration console which the security guys can put all kinds of rules. I'm pretty sure there are better solutions out there, or ones that do the same thing/have more functions that cost less than it. In the corporate world, you essentially need to put the blame on someone if things go awry and as far as I know, their support was top notch and the new vulnerabilities that appear on our networks are dealt swiftly due to the policies updates.