

The VA Decision Matrix displays the current and future VA IT position regarding different releases of a TRM entry. TRM Technology, obtained from the vendor (or from the release source). The Vendor Release table provides the known releases for the For additional information or assistance regarding Section 508, please contact the Section 508 Office at Decisions Section 508 compliance may be reviewed by the Section 508 Office and appropriate remedial action required if necessary. The Implementer of this technology has the responsibility to ensure the version deployed is 508-compliant. This technology has not been assessed by the Section 508 Office. Prior to use of this technology, users should check with their supervisor, Information Security Officer (ISO), Facility Chief Information Officer (CIO), or local Office of Information and Technology (OI&T) representative to ensure that all actions are consistent with current VA policies and procedures prior to implementation.

Users must ensure sensitive data is properly protected in compliance with all VA regulations. Users must ensure their use of this technology/standard is consistent with VA policies and standards, including, but not limited to, VA Handbooks 61 VA Directives 6004, 6513, and 6517 and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS). For more information on the use of cloud services and cloud-based products within VA, including VA private clouds, please see the Enterprise Cloud Solutions Office (ECSO) Portal at: Cloud services provided by the VAEC, which are listed in the VAEC Service Catalog, and those controlled and managed by an external Cloud Service Provider (i.e.
Symantec encryption desktop 10.3.2 update software#
This includes technologies deployed as software installations on VMs within VA-controlled cloud environments (e.g.

The TRM decisions in this entry only apply to technologies and versions owned, operated, managed, patched, and version-controlled by VA. This technology allows users to securely share files with specific individuals. Symantec Encryption Desktop (formerly PGP Desktop) provides multi-layered storage encryption for data files and folders. More information on the proper use of the TRM can be found on the Management by Encryption Management Server centralizes creation, deployment and management of data security policies and reporting.Technologies must be operated and maintained in accordance with Federal and Department security and.Allows users to easily and transparently share encrypted files and folders, improving data security without impacting user productivity.Rapid storage encryption deployment and transparent operation minimizes user disruption while improving stored data protection.Can be centrally deployed and managed by Symantec Encryption Management Server.Includes PGP Shredder which can completely destroy unwanted disk-based files and folders.Creates storage-independent encrypted containers for transport and sharing of specific files using included utilities PGP Self-Decrypting Archive, PGP Virtual Disk, and PGP Zip.Allows the creation and transparent sharing of encrypted files and folders stored on file servers.Locks down the entire contents of a laptop, desktop, external drive, or USB flash drive, including boot sectors, system, and swap files.Symantec Encryption Desktop Storage protects your data files and folders with multi-layered storage encryption by bundling Drive Encryption to secure the files stored on local hard drives and File Share Encryption to securely share files with selected colleagues and in the cloud.
