encrypt


Also found in: Dictionary, Thesaurus, Financial, Acronyms, Encyclopedia, Wikipedia.

encrypt

(ĕn-krĭpt′) [″ + Gr. kryptos, hidden]
To disguise; to shield from view by representing one symbolic character with another.
References in periodicals archive ?
The cooperation with Lets Encrypt affirms our commitment to providing the highest possible grade of security.
Re-keying is the operation where a new key is used to encrypt and decrypt data.
Ease of Implementation and Management: You've already got backup software, you're already using it, and you can keep on using it when you use it to encrypt data.
The decision about what disk data to encrypt should ultimately stem from a data classification exercise.
NetSign Privacy Manager's File Guard will encrypt files and directories--locking them and preventing them from being read by anyone who does not possess the correct certificate and password.
Since the appliance encrypts just block data, it will support storage virtualization as well.
Built on PKCS#11 standards, and featuring the AES 256-bit encryption algorithm, SecureDoc encrypts all residual data, temporary files, paging files, and hidden partitions that are often left unprotected.
With our range of mainframe channel gateways and encryption solutions, our customers can deploy industry standard encryption products to directly encrypt tape data distributed on CDs and DVDs, offering their customers, clients and partners secure data protection," stated Michael Saunders, Luminex's President.
Siafu Software, a leader in easy-to-install, easy-to-manage encrypted iSCSI solutions for affordable IP storage, today announced Siafu Sypher Encryption Appliances, a series of SAN solutions which securely compresses data and encrypts tapes destined for offsite locations.
UPONUS' technology simultaneously encrypts and compresses data streams for remote operations (sensors, UAVs, satellites, banking, sending instructions, etc.
Organizations need to look to solutions that will provide the necessary speed and control to encrypt data across traffic streams to effectively plug these security gaps.