Small Businesses

Disk Protect provides the easiest and quickest way for small and medium businesses to meet data compliance requirements and eliminate complexity. Through online reporting, Disk Protect users can prove encryption compliance in the event of a breach.

Medium Enterprise

Disk Protect protects enterprise environments against risks of data loss, and provides management of data life-cycle, as organisations maintain compliance.

Government and High Assurance

Under HM Government’s Commercial Product Assurance (CPA) and CAPS schemes, Disk Protect is certified against rigorous security and build standards.

Becrypt hash

Disk Protect Small to Medium Enterprise

Data Security for small businesses

Disk Protect is a full disk encryption solution to protect data-at-rest held on desktops, laptops, tablets and servers from theft or loss. The solution transparently encrypts device data, and uses strong authentication, preventing unauthorised access and enabling compliance. With seamless integration, users can single-sign-on to Windows, with no noticeable impact to performance or usability.

Who is this suitable for?

Small Business

Medium Enterprise

Local Government

Key specifications

  • Automates encryption reporting for regulatory compliance
  • FIPS 140-2 certified
  • Single sign-on
  • Secure hibernation
  • Secure wipe for decommissioning
  • Removable media protection
  • Multiple users per device

Managed

When combined with Becrypt Enterprise Manager, Disk Protect can be deployed throughout an organisation with little or no disruption to business activities.

Removable

Disk Protect can also encrypt the data on removable media such as Firewire, USB devices, SD cards, other mass storage devices and local disks.

Encrypted

Designed to enable security conscious organisations to deploy their workforce with confidence, the FIPS 140-2 certified software is compatible with a range of devices and operating systems.

Becrypt hash

Critical National Infrastructure CPA

Assured data security

Disk Protect is the only product to complete National Cyber Security Centre (NCSC) Commercial Product Assurance (CPA) certification as a software full-disk encryption solution for desktops, laptops, tablets and servers. Suitable for protecting Government data from theft and loss, Disk Protect CPA is available for any security conscious organisation. The CPA standard builds on FIPS certification, and provides comprehensive assurance against a set of standards that cover product and supplier quality. CPA combines the benefits of a commercial product that includes enterprise-class centralised management, with government-grade assurance.

Who is this suitable for?

Governments

Military

NATO

Critical National Infrastructure

Key specifications

  • CPA certified
  • Tablet Touchscreen support
  • Removable media encryption
  • Multi-user support at pre-boot
  • Secure hibernation
  • Single sign-on
  • Central key escrow

Approved

Government’s Commercial Product Assurance (CPA) scheme evaluates commercial off-the-shelf security to be certified against published security and developmental standards. This means Disk Protect CPA is suitable for governments, agencies, supply chains, and beyond.

Encrypted

Disk Protect CPA works by transparently encrypting every section of the hard drive, and is EU and NATO certified up to RESTRICTED. Whether working on a desktop, laptop or mobile device, your data will be fully encrypted.

Flexible

The product can be installed at any time, and will encrypt data while the user works. Once installed, all read and write requests are decrypted and encrypted invisibly, without user interaction, allowing continued use of the system.

Security that’s up to Commercial Product Assurance.

Becrypt hash

Government DPE

Leveraging the provenance of DPE to manage risk

DPE SK is an un-certified full disk encryption solution that transparently encrypts data on laptops, desktops, tablets and servers, without the need for external key material. Engineered from the same code, by the same people and in the same environment as Disk Protect Enhanced, providing product familiarity and provenance to support today’s evolving risk management requirements.

Disk Protect Enhanced was developed for High Assurance environments within government, military and NATO, where appropriate certification is necessary. DISK Protect Enhanced can only be procured as part of a risk management process in collaboration with NCSC.

Struggling to find an encryption solution for protecting systems above Official?

Since the introduction of the Government Security Classification scheme in 2014, many government organisations and suppliers to government have had to grapple with navigating a path towards finding the most appropriate data-at-rest encryption solutions to operate at the higher levels of data classification. Organisations are encouraged to adopt an informed risk management approach, balancing a range of requirements. Becrypt have compiled a short paper, providing an overview of a number of factors organisations are typically required to consider. For a copy, please complete the contact us form here, requesting the Full Disk Encryption for High Assurance environments paper.

Who is this suitable for?

Governments

Military

Nato

Key specifications

  • Self-keying full disk encryption
  • No requirement for external key material
  • Pre-boot authentication
  • Multi-user support at pre-boot
  • Two-factor authentication (2FA)
  • Stand-alone capability

Approval

DPE SK is not a formally approved product, and as such, is not subject to the application processes of government approved variants. Built to enable agility and informed risk management, DPE SK supports the use of evolving hardware platforms at pace.

Provenance

DPE SK keys are self generated (AES 256 bit), using the same algorithms as Disk Protect CPA. It utilises the same code and build environment as Disk Protect Enhanced, ensuring the very best in software encryption.

Transparent

DPE SK provides full disk encryption, without any disruption to usability. Once the user has logged in to Windows, DPE SK operates transparently, with the ability for standard applications to be used as normal.

Leveraging provenance for today's risk management challenges.

Latest News

  • Becrypt continues enthusiastic support of the National Cyber Security Centre’s CyberFirst programme

    Becrypt continues enthusiastic support of the National Cyber Security Centre’s CyberFirst programme ...Read more

    26/09/2018

  • Zero Trust networks with zero hype - an overview of real world deployments

    An overview of the NCSC CloudClient project in the context of Zero Trust network characteristics ...Read more

    26/09/2018

  • Measured Boot & Measured Execution for Device Health

    Using Measured Boot & Measured Execution with Remote Attestation to measure Device Health with Paradox OS ...Read more

    26/09/2018