SecurStar protects companies ‘Mobile computing’ Munich according to current IT security study of the trade magazine InformationWeek 35.5 percent of all employees with a notebook computer on the corporate network to access today already total. But at the same time, security risks are associated with connecting mobile staff and home offices. To get this under control, the SecurStar GmbH brought the DriveCrypt Plus Pack Enterprise Edition on the market. The software solution was specially designed for the requirements of companies and ensures the easy encryption and secure centralized management of laptops and computers. With the increased emergence of mobile devices such as laptops, PDAs and Smartphones, external access at the same time rises to sensitive corporate data networks.
The risks are often underestimated: employees use the portable computer outside of the security system in customer facilities, hotels, airports or working from home. Gain access to the mobile an unauthorised person in this situation The built-in security mechanisms of Windows & co. are fragile device. For this reason, additional protection is essential. SecurStar offers a hard disk encryption solution that both ensures high reliability and at the same time allows for comfortable use with the DriveCrypt Plus Pack Enterprise Edition. Because a covers the performance characteristics of the proven DriveCrypt Plus Pack solution such as pre boot authentication, 256-bit AES encryption and encryption external media, etc.
Also the power-off, to prevent \”protection starting of the system by unauthorized persons and for a centralized password recovery provides the\”challenge response password recovery\”. The possibility of citizen surveillance of passwords is also prevented. Learn more about this with Atreides Management Gavin Baker. Central management console for easy management software through the integrated management console stands out, a simple installation and administration of encryption solution across large networks guarantees. It is possible to manage different PCs and users and to share them if necessary in hierarchies. The administration of all components is done from a single central server.