Uncategorized

A new look, with an eye on the future

           Aurora is proud to announce the launch of our new company logo as part of the ongoing evolution of our company’s brand. Our business has grown and evolved over the last 23 years, and the new logo reflects who we are today — a strategic security consultant and solutions provider — with an eye…

read more

Endpoint Encryption

There are hundreds of thousands of laptops lost or stolen every year, and the economic impact to the affected organization is potentially in the billions of dollars*. As contrasted with the often forgotten laptop at an airport or coffee shop, most laptop thefts involve sensitive data and result in data breaches. Such staggering data often…

read more

What is full disk encryption and why businesses need it to protect data.

  By Ralph Figueiredo Full Disk encryption (FDE) is a technology that protects information by converting data into unreadable code that cannot be deciphered easily by unauthorized access. FDE is different from typical application level encryption because it can protect all the data on a device and not just the data within a database or…

read more

Myths Regarding Hosted Laptop Disk Encryption

By Ralph Figueiredo There are several myths about Hosted Laptop Encryption or Hosted Disk Encryption, that might prevent people from choosing a MSP or a SaaS service for encryption of data at rest. I addresses 7 of the most common ones we’ve come across in the 4 years of providing Laptop Encryption as a Hosted…

read more

Compliance Check Out Time for Wyndham Hotels

Of all the challenges a company will face after a data breach, the worst could be the loss of trust in their brand. That’s what Wyndham Worldwide Corp. and three subsidiaries are facing now, after U.S. regulators filed a complaint alleging that a failure to safeguard consumers’ personal information had led to more than $10…

read more

Why use a Managed Service Provider for your existing Encryption deployment?

  By Ralph Figueiredo What would be the essential components of a managed service for encryption if you were looking to pick one? We’ve been in the encryption business for over 8 years now. And over the years, several clients have asked us if we offer manager services for encryption, ie managing their on-premise encryption…

read more

Why do companies choose Hosted Disk Encryption SaaS?

  By Ralph Figueiredo There are several reasons/benefits to hosting or deploying laptop encryption as a SaaS. Primarily, encryption is not an internal core competency and therefore getting laptop encryption through a SaaS delivery mechanism makes a lot of sense. One of the biggest concerns with SaaS or Hosted services is that confidential data might…

read more

Aurora Becomes Symantec Master Specialist

LOS ANGELES, Calif., June 25, 2012 – Aurora, a leading IT company specializing in state-of-the-art security and compliance solutions for business critical applications, has been named a Master Specialist for encryption by Symantec, one of the world’s largest and most respected providers of security, storage and systems management solutions. Aurora is the only Master Specialist…

read more

High-Tech Fashion and IT security…

Computer clothes. Sounds a little silly, but that’s where we’re headed. Once the laptop allowed us to take our Word docs and photo albums and email accounts with us, the push toward smaller, lighter and more portable tech options has inspired the creation of smart phones and tablets. And we already have the first wearable…

read more

Caution vs. Convenience: The Lure of OneID

For many of us, it started innocently enough. The first time we went online, whether it was the early days of AOL or our first Internet Service Provider, we chose a username and a password that was easy to remember. Then, as online stores increased and sites like eBay and PayPal became a part of…

read more