SOURCE: CREDANT Technologies

April 30, 2008 21:48 ET

Post-RSA 2008 Poll Shows Those in Security Industry Feel the Threat of Losing Sensitive Data on Mobile Devices Is Growing, But Feel They Are Getting Smarter About How They Prevent Breaches

Video Poll Identifies Encryption as the Number One Choice to Protect Data on Laptops, Smartphones, and External Media; Data Encryption Is Preferred Over Disk Encryption; and Ease of Use Is Paramount

DALLAS, TX--(Marketwire - April 30, 2008) - A two-day video poll of attendees conducted at the RSA Conference held earlier this month in San Francisco was made available today by CREDANT Technologies, the market leader in endpoint data protection solutions. Results of the poll demonstrate that more executives and those employed in the business of IT security believe the threat against laptops and mobile endpoints is real and are arming themselves against data loss -- and with a vengeance!

The informal poll conducted by an independent video camera crew of 40+ randomly chosen show attendees, brought a clearer picture of the state of security for data that becomes mobile. All were asked four questions on camera: Is the threat against laptops and mobile endpoints real or hype, what is needed to protect data, what type of encryption is needed, and how can we make it more effective?

100% of those interviewed said the threat of data loss on laptops, smartphones and external devices is real. While not terribly startling, the next finding, that 90% of respondents now agree that encryption is a necessity, demonstrates the steep learning curve that has taken place over the last two years.

When asked what type of encryption is needed, most stated technologies that secure the data, not simply the device. The security industry has become much smarter over the last two years. When asked how encryption can be made more effective, ease of use was named as the number one requirement respondents look for in an encryption solution. In the words of one respondent, "If it's not easy to use people won't use it and will find ways to bypass it -- then everything is for naught." Participants in the video poll agree: the threat is real, encryption works, data over disk encryption, and it has to be easy to deploy and use.

To learn more about CREDANT Technologies and to view the video highlighting concerns and views on endpoint data protection shared by RSA 2008 attendees, you can go to www.credant.com.

About CREDANT Technologies

CREDANT Technologies is the market leader in endpoint data protection solutions. CREDANT's data security solutions preserve customer brand and reduce the cost of compliance, enabling business to "protect what matters." CREDANT Mobile Guardian is the only centrally managed endpoint data protection solution providing strong authentication, intelligent encryption, usage controls, and key management for data recovery. By aligning security to the type of user, device and location, CREDANT ensures the audit and enforcement of security policies across all computing endpoints. Strategic partners and customers include leaders in finance, government, healthcare, manufacturing, retail, technology, and services. CREDANT was selected by Red Herring as one of the top 100 privately held companies and top 100 Innovators for 2004, and was named Ernst & Young Entrepreneur Of The Year 2005. Austin Ventures, Menlo Ventures, Crescendo Ventures, Intel Capital, and Cisco Systems are investors in CREDANT Technologies. For more information, visit www.credant.com.

CREDANT Technologies, CREDANT, the CREDANT Technologies logo, and the "Be Mobile. Be Secure." tagline are registered trademarks of CREDANT Technologies, Inc.

Contact Information