Data at Rest (DAR)

The Federal Government,  its defense contractors, and the  private sector continue to experience immeasurable, confidential and company-sensitive data losses as a result of the Advanced Persistent Threat—advanced stealthy procedures developed by nation and non-nation state actors, that use traditional malware in combination with social engineering techniques, to exploit typical PC-based vulnerabilities.

USG policy instructs agencies to adopt measures and select DAR encryption products to protect personally identifiable information (PII) stored on laptop computers, desktop computers, tablet PCs, smart phones, personal digital assistants, and removable storage devices. ID has long been an advocate for Data at Rest (DAR) encryption standards to protect PII.  ID has created end-to-end solutions focused on protecting Personally Identifiable Information (PII) by:

  • Employing NSA-approved Suite B Cryptography on all computing platforms
  • Scanning and monitoring Data in Motion (DIM) across all networks
  • Implementing Enterprise Rights Management (ERM) techniques to prevent data loss
  • Physically tracking devices as they move throughout an enterprise
  • Certifying proper removable media destruction and disposal processes

ID’s approach to protecting data-at-rest and data-in-transit is consistent with, and fully meets the security goals of USG organizations and agencies, which are to: Prevent unauthorized disclosure and/or access to sensitive data; ensure the integrity of data by assuring it has not been altered or tampered with; provide unimpeded, continuous access to data, and confirm the identity and origin of the source of data.