Friday, 16 March 2012

Becrypt Enterprise Manager

 

 Becrypt Enterprise Manager

  Security management suite for key management of your estate of Becrypt products...

Acenseo is the leading network security services consultants in UK

Becrypt Enterprise Manager is a central management solution or security management suite, that provides a central repository and database from which to view all Becrypt product related events helping organisations to manage and enforce data security policy and demonstrate compliance.

 

Becrypt Enterprise Manager is a security management suite that enables organisations to manage their estate of Becrypt products. Centralised key management and recovery data allows products to be deployed quickly and easily without the need for administrators to visit each machine, or requiring the end-user to perform any tasks.

 


Becrypt Enterprise Manager helps to streamline all aspects of the management of data security products. It helps to enforce an organisational security policy and gives the ability to demonstrate compliance through auditing and reporting functionality within a simple to use security management suite. It provides full listings of all encrypted computers, so that should a device be lost or stolen its encryption status can be ascertained immediately and therefore the risk to the data assessed.

 

Becrypt Enterprise Manager works with standard third party deployment tools ensure that the roll out of encryption is made faster and subsequent management overheads are minimised. It automates key management for Becrypt DISK Protect and Removable Media Module, greatly reducing the time and administration normally associated with key management, and helps to comply with key escrow regulations.

 

Features:

  • Aids in the set up and deployment of DISK Protect to many PCs at once
  • Existing Active Directory user and machine hierarchies can be imported
  • Remotely add and remove access to DISK Protect computers
  • New Users can be quickly added and existing users can be swiftly deleted when required preventing access to a DISK Protect encrypted machine
  • User passwords can be remotely reset, allowing remote recovery by an administrator should a machine become locked

Benefits:

  • Centralised roll-out of DISK Protect saves time and minimises end-user involvement
  • Saves time and minimises errors associated with re-keying data
  • No need to physically go to the machine, saves time and resource
  • Users can be repudiated even if the machine is not present
  • Machines can be reset if a password is lost, without the need for network access

 

 Key Management

 

Features:

  • Keys are stored centrally in the encrypted Enterprise Manager database
  • When using Removable Media Module to encrypt USB storage devices, keys are stored in the users profile and automatically made available when the users logs on to the managed computer

Benefits:

  • Allows compliance with key escrow regulations
  • Allows quick and easy sharing of encrypted information between users

 

 Auditing and Reporting

 

Features:

  • Protect installs,Connect Protect blocked and allowed device access, password changes and authentication failures
  • Administrators can set email notification warnings of irregular events
  • Library of pre-defined reports providing high level and in-depth information about the organisation’s Becrypt estate
  • Full search facility allows lost/stolen laptops to be quickly identified and encryption status immediately obtained

Benefits:

  • Easy to use Audit Trail provides details of noteworthy events, at a glance
  • Immediate alerts if, for example, a user is trying to use an unauthorised device repeatedly
  • Administrators have vital information such as the percentage of encrypted machines and number of re-set passwords
  • Fast risk assessment in the event of a lost/stolen device

How it works?


Becrypt Enterprise Manager collects data from Becrypt’s family of data security solutions including DISK Protect, Removable Media Module and Connect Protect. All data is stored in a database allowing easy central storage, backup and recovery. Auditing events such as password changes, key requests and user recovery are all logged centrally, and can be viewed by multiple administrators from multiple locations.

 

Further information on Becrypt Products and Services is available from our marketing team on 0118 979 0000 or email us at info@acenseo.com.

No comments:

Post a Comment