Security management suite for key management of your estate of Becrypt products
Becrypt Enterprise Manager is a central management solution or security management suite, that provides a central repository and database from which to view all Becrypt product related events helping organisations to manage and enforce data security policy and demonstrate compliance.
Becrypt Enterprise Manager is a security management suite that enables organisations to manage their estate of Becrypt products. Centralised key management and recovery data allows products to be deployed quickly and easily without the need for administrators to visit each machine, or requiring the end-user to perform any tasks.
Becrypt Enterprise Manager helps to streamline all aspects of the management of data security products. It helps to enforce an organisational security policy and gives the ability to demonstrate compliance through auditing and reporting functionality within a simple to use security management suite. It provides full listings of all encrypted computers, so that should a device be lost or stolen its encryption status can be ascertained immediately and therefore the risk to the data assessed.
Becrypt Enterprise Manager works with standard third party deployment tools ensure that the roll out of encryption is made faster and subsequent management overheads are minimised. It automates key management for Becrypt DISK Protect and Removable Media Module, greatly reducing the time and administration normally associated with key management, and helps to comply with key escrow regulations.
Features / Benefits
|Aids in the set up and deployment of DISK Protect to many PCs at once||Centralised roll-out of DISK Protect saves time and minimises end-user involvement|
|Existing Active Directory user and machine hierarchies can be imported||Saves time and minimises errors associated with re-keying data|
|Remotely add and remove access to DISK Protect computers||No need to physically go to the machine, saves time and resource|
|New Users can be quickly added and existing users can be swiftly deleted when required preventing access to a DISK Protect encrypted machine||Users can be repudiated even if the machine is not present|
|User passwords can be remotely reset, allowing remote recovery by an administrator should a machine become locked||Machines can be reset if a password is lost, without the need for network access|
|Keys are stored centrally in the encrypted Enterprise Manager database||Allows compliance with key escrow regulations|
|When using Removable Media Module to encrypt USB storage devices, keys are stored in the users profile and automatically made available when the users logs on to the managed computer||Allows quick and easy sharing of encrypted information between users|
Auditing and Reporting
|Protect installs,Connect Protect blocked and allowed device access, password changes and authentication failures||Easy to use Audit Trail provides details of noteworthy events, at a glance|
|Administrators can set email notification warnings of irregular events||Immediate alerts if, for example, a user is trying to use an unauthorised device repeatedly|
|Library of pre-defined reports providing high level and in-depth information about the organisation’s Becrypt estate||Administrators have vital information such as the percentage of encrypted machines and number of re-set passwords|
|Full search facility allows lost/stolen laptops to be quickly identified and encryption status immediately obtained||Fast risk assessment in the event of a lost/stolen device|
How it works
Becrypt Enterprise Manager collects data from Becrypt’s family of data security solutions including DISK Protect, Removable Media Module and Connect Protect. All data is stored in a database allowing easy central storage, backup and recovery. Auditing events such as password changes, key requests and user recovery are all logged centrally, and can be viewed by multiple administrators from multiple locations.Request a free 30-day trial version