Examples of using Disk encryption in English and their translations into Italian
{-}
- 
                        Colloquial
                    
- 
                        Official
                    
- 
                        Medicine
                    
- 
                        Financial
                    
- 
                        Ecclesiastic
                    
- 
                        Ecclesiastic
                    
- 
                        Computer
                    
- 
                        Programming
                    
- 
                        Official/political
                    
fast, responsive disk encryption.
ESET Full Disk Encryption utilizes the ESET native encryption  engine,
Full disk encryption solutions like LUKS only protect the data when your computer is off.
other files in the TVS-1282T shared folder through disk encryption.
SafeBit Disk Encryption is the perfect electronic vault you need for your privacy.
including a random 16-byte key for disk encryption and an Elliptic Curve(EC) key pair.
fast, responsive disk encryption.
Using Comodo Disk Encryption the storage of sensitive information is much safer
use file based encryption  combined with another solution such as full disk encryption.
The program Comodo Disk Encryption is used especially for hard disk encryption, 
Comodo Disk Encryption::: a software that allows users to encrypt sensitive data stored on the computer.
Sensitive data can also now be better secured across varied environments with enhancements to Network-Bound Disk Encryption that support automatic decryption of data volumes.
Comply with data protection regulations with remotely manageable ESET Full Disk Encryption add-on.
Under NAI, the PGP team added disk encryption, desktop firewalls, intrusion detection,
Some features are not compatible with whole disk encryption software such as Safeguard Easy.
Another approach used by some conventional disk encryption software suites is creating a second encrypted volume within a container volume.
Saves the disk encryption key and the decryption code to disk  for later use in the MBR infection code.
This is deadly for disk encryption products because they rely on keeping master decryption keys in DRAM.
See Section 9.8.1,“Removable disk encryption with dm-crypt/LUKS” for cross platform sharing of data using device level encryption. .
industrial espionage through disk encryption was our prime aim.