Centralized management for self-encrypting drives
Posted on 26 April 2012.
Credant Technologies announced Credant Enterprise Edition 7.3, which includes improved features and functionality to help organizations meet their growing needs for protecting data across multiple devices and platforms, including OPAL compliant Self-Encrypting Drives (SEDs), and delivers enhanced protection for removable media.


Credant's solution delivers patented real-time data-centric disk encryption to more than ten million devices worldwide while addressing today's biggest enterprise security issue, managing the security of sensitive data, whether it is located on laptops, smartphones, removable media or private or public cloud infrastructures.

Responding to the surge of high profile, costly 2011 data breaches, along with increasingly rapid adoption of bring your own device (BYOD), the latest enhancements to Credant Enterprise Edition 7.3 help companies manage these and other challenges with features that include:

Management for self-encrypting drives
Companies can now integrate the management of SEDs into the same console managing all other protected platforms including file/folder, BitLocker, removable media, smartphones and Virtual Desktop Image (VDI).

The integrated management console helps organizations more effectively utilize and manage the growing number of hardware-based full disk encryption devices in employees’ PCs and laptops.

Additionally, administrators can now remotely manage users, wipe or disable devices as need be and remotely unlock them for patching and maintenance.

Windows Server 2008 data protection
Addressing the growing concern of data on servers, this new version adds the ability to protect information on Windows Server 2008, even if data is being transferred onto removable media.

This latest enhancement extends Credant’s data-centric approach to include protection of physical and virtual servers, where sensitive data often resides.

External media port control
Enhanced controls for removable media reduce the burden on IT by centrally deploying, managing and enforcing encryption and port control policies across the organization.





Spotlight

Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //