data cryptography encryption data management database recovery management laptops analysis encryption agent computers electronics authentication computer encrypted policy security