I had an interesting query about my last blog post [Enterprise Systems are Security-Ready], basically asking me what I decided to do for Full-Disk Encryption (FDE) for my laptop.
Earlier this year, IBM mandated that every employee provided a laptop had to implement Full-Disk Encryption for their primary hard drive, and any other drive, internal or external, that contained sensitive information. An exception was granted to anyone who NEVER took their laptop out of the IBM building. At IBM Tucson, we have five buildings, so if you are in the habit of taking your laptop from one building to another, then encryption is required!
The need to secure the information on your laptop has existed ever since laptops were given to employees. In my blog post [Biggest Mistakes of 2006], I wrote the following:
"Laptops made the news this year in a variety of ways. #1 was exploding batteries, and #6 were the stolen laptops that exposed private personal information. Someone I know was listed in one of these stolen databases, so this last one hits close to home. Security is becoming a bigger issue now, and IBM was the first to deliver device-based encryption with the TS1120 enterprise tape drive."
Not surprisingly, IBM laptops are tracked and monitored. In my blog post [Using ILM to Save Trees], I wrote the following:
"Some assets might be declared a 'necessary evil' like laptops, but are tracked to the n'th degree to ensure they are not lost, stolen or taken out of the building. Other assets are declared "strategically important" but are readily discarded, or at least allowed to [walk out the door each evening]."
When it was [time for a new laptop] in 2010, I spent a week [re-partitioning the drive], [transfering files], [installing programs], [re-organizing my folders], and finally [testing my system]. It was dual-boot so that I could run either Windows or Linux, as needed, to demonstrate various software solutions at the IBM Tucson Executive Briefing Center.
Unfortunately, dual-boot environments won't cut it for Full-Disk Encryption. For Windows users, IBM has chosen Pretty Good Privacy [PGP]. For Linux users, IBM has chosen Linux Unified Key Setup [LUKS]. PGP doesn't work with Linux, and LUKS doesn't work with Windows.
For those of us who may need access to both Operating Systems, we have to choose. Select one as the primary OS, and run the other as a guest virtual machine. I opted for Red Hat Enterprise Linux 6 as my primary, with LUKS encryption, and Linux KVM to run Windows as the guest.
I am not alone. While I chose the Linux method voluntarily, IBM has decided that 70,000 employees must also set up their systems this way, switching them from Windows to Linux by year end, but allowing them to run Windows as a KVM guest image if needed.
Let's take a look at the pros and cons:
In theory, I could have tried the Windows/PGP method for a few weeks, then gone through the entire process to switch over to Linux/LUKS, and then draw my comparisons that way. Instead, I just chose the Linux/LUKS method, and am happy with my decision.
My October blog post [New IBM PureData Systems help clients harness data for critical insights] included a video on Enterprise Systems being "Data Ready" for analytics. That was the first of a series of videos I filmed in Austin. Here is the next in the series, a [YouTube video] focused on security:
In my blog post [The Three Different Meanings of "Protect"], I mentioned that to protect data, you need to protect data against unethical tampering, unexpected loss, and unauthorized access.
For the past three decades, IBM has offered security solutions to protect against unauthorized access. Let's take a look at three different approaches available today for the encryption of data.
The need for security grows every year. Enterprise Systems are Security-ready to protect your most mission critical application data.
Mark your calednars! The dates are now official for IBM storage-related events in 2013. I know many of you plan your travel budgets early in the year, so I hope this will help you plan accordingly.
[IBM Pulse 2013] will be held March 3-6, 2013, at the MGM Grand in Las Vegas, Nevada. Back in 2008, I helped launch the inaugural event, combining previous events that focused on Tivoli and Maximo software solutions.
On a smarter planet, organizations must implement bold strategies to optimize business services, processes, and relationships. Cloud and mobility offer unlimited potential to create smarter infrastructures that fundamentally change the way we do business.
However, to deliver on this potential, you must manage your infrastructure through rapid change while changing the economics of IT: unleashing innovation, reinventing relationships and uncovering new markets.
Attend Pulse 2013 for the opportunity to share your expertise with thousands of your business and IT peers as you explore these strategies and more. With three days of top-notch keynotes, over 300 breakout sessions, labs, certification and our best Solution Expo ever, Pulse will provide the tools, insights and networking you need to turn opportunities into outcomes.
[IBM Edge 2013] will be held June 10-14, 2013, at the Mandalay Bay in Las Vegas, Nevada. Last year, I helped launch the inaugural event, combining previous storage events for storage admins, executives, and IBM Business Partners. Next year, Edge2013 will offer:
The list of speakers have not yet been finalized, but I hope to participate at one or both of these events!
I hope all of my American readers had a wonderful Thanksgiving holiday! The day after Thanksgiving is "Black Friday", the unofficial starting data for shopping for upcoming holiday presents and decorations. The Monday after that is now often referred to as "Cyber Monday", where many people purchase items on-line.
I thought this would be good time to promote my book series, Inside System Storage, Volumes I through V. These are available direct from my publisher, [Lulu], or from other on-line retailers.
The old adage "Never judge a book by its cover" often leads technical authors to select bland cover designs. I designed the cover art for the series to have a consistent look, but be unique enough to know each book is different. They all have a beige background with black text, three or four graphics representing the various storage themes du jour, and a color stripe spread diagonally across the spine.
Several readers have asked if there was any rhyme or reason for the color of each spine. One guessed it was based on the [electronic color code] used on resistors to mark their value. When I was getting my college degree in Electrical Engineering, the mnemonic "Better Be Right Or Your Great Big Venture Goes West" helped us remember the sequence: Black, Brown, Red, Orange, Yellow, Green, Blue, Violet, Grey and White.
I can assure everyone I was not that clever. Here, instead, is the story behind each color chosen:
Volume I: Green
Volume II: Orange
Volume III: Purple
However, as the owners dropped out, one to start a family, another to take care of her father after her mother passed away, I started 2009 as the majority owner. The economic recession took its toll. Members were not spending as much of their disposable income of fun and entertainment. We restructured the company, revamped the website, and adopted Purple as our official color. Our event coordinators all wore purple shirts, and carried purple clipboards. Despite this major transformation, I just did not have time to run this company while still working full-time at IBM, so I sold it at year end.
Volume IV: Blue
Volume V: Grey
If you were having trouble getting ideas for gifts this holiday season, hopefully, this post gave you five new ideas for your friends, family, coworkers and clients! They are all available in hardcover, paperback, and eBook (PDF) for viewing on desktops, laptops, tablets or smartphones.
Comments (2) Visits (7713)