Becrypt are aware of the emerging information regarding potential vulnerabilities in RSA keys generated by a software library developed by Infineon Technologies. Please find more information and guidance here.

Disk Encryption

Secure your data wherever it travels with full disk encryption software.

Buy now
Disk Encryption

Transparent Protection

Disk Protect is an assured full disk encryption solution securing data on touch-screen tablets, laptops, desktops, servers and removable media from theft and loss. Devices can be encrypted at any time and once installed, all data is encrypted transparently, allowing authorised users to access data without impact on performance.

A removable media module enables the full encryption of data written to removable media, and may either employ a personal Encryption Key or a shared Encryption Key allowing authorised users to exchange protected data.

When combined with Becrypt's Enterprise Manager, Disk Protect can be rapidly deployed throughout an organisation with little disruption to business activities - with laptops and PCs secured within hours. Devices can also be supported in a stand-alone (un-managed) mode should customer requirements or security profile demand it.

Disk Protect is available in a number of approved variants, from protecting commercially sensitive data right through to a high-grade variant used to protect UK classified data (up to SECRET). To find the most suitable variant for you, please see the Features & Benefits section below and Product Certifications.

Supporting Touchscreen Tablets

Windows based tablets are increasingly being deployed in government and commercial enterprises now that there has been a significant improvement in form factor design and performance. IT professionals are also finding Windows based devices easier and more cost effective to integrate with existing infrastructure and security architectures.

Becrypt's Disk Protect offers end point protection for a wide range of commercial and ruggedized tablets running either Windows 7 or Windows 8. It is unique, in that it supports a wide range of touchscreen devices, without reliance on hardware manufacturers to present the on-screen keyboard for pre-boot authentication (no external keyboard is required). It can be used in a stand-alone or centrally managed environment and is available in either Standard or CPA variants.

Encryption Without Authentication

NetStart, incorporating patented technology, is a complementary product to Disk Protect which provides a secure network authentication mechanism, leveraging Trusted Platform Module (TPM) technology. This technology overrides the need for user pre-boot authentication whenever the device is connected to a trusted and physical corporate network.

NetStart allows seamless encryption of desktop machines, enables free seating and supports the implementation of pooled laptop and notebook devices throughout the estate. Devices remain fully encrypted and protected should they be stolen or removed from the network.

For more information on NetStart, please contact our sales team.

Variants

Disk Protect CPA : Suitable for organisations that require accreditation (including government, military and NATO organisations), but also available for commercial entities that demand more confidence in their security product. Approved to protect OFFICIAL data within the new UK Government Classification Scheme (GSC), without the need for CESG sales approval and key material. Customers can achieve all the benefits of full centralised management, but would typically be configured for two-factor authentication.

Disk Protect Standard : Suitable for lower threat environments including commercial and government organisations where FIPS 140-2 is sufficient. Centralised management, one factor authentication and single sign-on ensure that it is easy to deploy, manage and use.

Disk Protect CAPS : Available for the higher threat environments within UK government, military and NATO organisations where certification is necessary. These products are subject to export control and can only be purchased with prior sales approval and necessary key material from CESG. Published security procedures also provide appropriate guidance throughout the product life span. Security constraints, due to product architecture and operational procedures, means that some auditing and reporting capability is available, but not full central management.

Features and Benefits

Disk Protect Variants
Standard CPA CPA+ Baseline Enhanced
Certification FIPS 140-2 CPA CPA CAPS CAPS
Touchscreen support
Transparent to the user
Removable media encryption
Pre-boot authentication
Multi user support at pre-boot
Self registration for new users
Two-Factor authentication (2FA)
Supports TPM (for 2FA)
Secure hibernation *
Single sign-on
Stand-alone capability
Central auditing & reporting
Centralised management
Central key escrow
Netstart option
Requires CESG sales approval
Requires CESG key material
Supported operating systems
Windows 10
Windows 8
Windows 7
Windows XP
Windows Server 2003
Windows Server 2008
Windows Server 2012

* Supported but not recommended by CESG