While you’re worried about all of the people trying to get at your data and infect your software, don’t forget there are plenty who would just as soon grab your laptop bag and run. Or maybe a trusted employee will hang out at the office a little late, and put a machine in their bag before they go home. “Jeff always works late.”
Most offices aren’t teeming with the criminal element. But, there are some environments where expensive equipment is kept in insecure areas. CTI installs surveillance equipment, anti-theft devices, keyless entry, and emergency systems.
In some cases the data on a laptop or device is more valuable than the device itself. In the case where a cut-purse has run off with your computer containing sensitive information, you want to know there is no way for that criminal to access your data. Use of system-wide encryption ensures they must discard the machine, or find a way to erase the encrypted storage before using it. Confidence in this situation of powerlessness is built from a complete and solid security protocol.