Disk Protect is an assured full disk encryption solution securing data on touch-screen tablets, laptops, desktops, servers and removable media from theft and loss. Devices can be encrypted at any time and once installed, all data is encrypted transparently, allowing authorised users to access data without impact on performance.
A removable media module enables the full encryption of data written to removable media, and may either employ a personal Encryption Key or a shared Encryption Key allowing authorised users to exchange protected data.
When combined with Becrypt's Enterprise Manager, Disk Protect can be rapidly deployed throughout an organisation with little disruption to business activities - with laptops and PCs secured within hours. Devices can also be supported in a stand-alone (un-managed) mode should customer requirements or security profile demand it.
Disk Protect is available in a number of approved variants, from protecting commercially sensitive data right through to a high-grade variant used to protect UK classified data (up to SECRET). To find the most suitable variant for you, please see the Features & Benefits section below and Product Certifications.
Supporting Touchscreen Tablets
Windows based tablets are increasingly being deployed in government and commercial enterprises now that there has been a significant improvement in form factor design and performance. IT professionals are also finding Windows based devices easier and more cost effective to integrate with existing infrastructure and security architectures.
Becrypt's Disk Protect offers end point protection for a wide range of commercial and ruggedized tablets running either Windows 7 or Windows 8. It is unique, in that it supports a wide range of touchscreen devices, without reliance on hardware manufacturers to present the on-screen keyboard for pre-boot authentication (no external keyboard is required). It can be used in a stand-alone or centrally managed environment and is available in either Standard or CPA variants.
Encryption Without Authentication
NetStart, incorporating patented technology, is a complementary product to Disk Protect which provides a secure network authentication mechanism, leveraging Trusted Platform Module (TPM) technology. This technology overrides the need for user pre-boot authentication whenever the device is connected to a trusted and physical corporate network.
NetStart allows seamless encryption of desktop machines, enables free seating and supports the implementation of pooled laptop and notebook devices throughout the estate. Devices remain fully encrypted and protected should they be stolen or removed from the network.
For more information on NetStart, please contact our sales team.
Disk Protect CPA : Suitable for organisations that require accreditation (including government, military and NATO organisations), but also available for commercial entities that demand more confidence in their security product. Approved to protect OFFICIAL data within the new UK Government Classification Scheme (GSC), without the need for CESG sales approval and key material. Customers can achieve all the benefits of full centralised management, but would typically be configured for two-factor authentication.
Disk Protect Standard : Suitable for lower threat environments including commercial and government organisations where FIPS 140-2 is sufficient. Centralised management, one factor authentication and single sign-on ensure that it is easy to deploy, manage and use.
Disk Protect CAPS : Available for the higher threat environments within UK government, military and NATO organisations where certification is necessary. These products are subject to export control and can only be purchased with prior sales approval and necessary key material from CESG. Published security procedures also provide appropriate guidance throughout the product life span. Security constraints, due to product architecture and operational procedures, means that some auditing and reporting capability is available, but not full central management.
Features and Benefits
|Disk Protect Variants|
|Transparent to the user|
|Removable media encryption|
|Multi user support at pre-boot|
|Self registration for new users|
|Two-Factor authentication (2FA)|
|Supports TPM (for 2FA)|
|Central auditing & reporting|
|Central key escrow|
|Requires CESG sales approval|
|Requires CESG key material|
|Supported operating systems|
|Windows 8 **|
|Windows Server 2003|
|Windows Server 2008|
|Windows Server 2012|
* Supported but not recommended by CESG
** A known issue exists when applying the upgrade from Windows 8 to Windows 8.1 on UEFI computers, which causes boot-time failures. It is recommended that Windows Updates are configured to prevent this upgrade being applied automatically. If the upgrade is required, then Disk Protect should be uninstalled prior to the upgrade, and then re-installed following the upgrade.