Centralised Becrypt Management
Becrypt Enterprise Manager (BEM) allows you to comprehensively manage your Becrypt Protection Suite of products:
- Disk Protect
- Connect Protect
- mShare
BEM enables you to easily create and apply policies, carry out fast risk assessments in the event of a lost or stolen device, easily address problems such as forgotten passwords, and aids in the set up and quick deployment of Becrypt software to your IT estate.
BEM’s user management permits administrators to remove and control different levels of user access to devices and data.
Audit Trail
Every user event is logged and reported in the BEM database, for quick auditing, and a full view of end user events and usage. BEM makes it straightforward to comply with data policies set by organisations and industries.
User Access & Passwords
Administrators can remove and control different levels of user access to devices and data. A password policy manager is integrated within user management, and in the event of device loss or theft, administrators can access device management to view encryption status and protect data.
Reporting
A notification is sent to the administrator when a user is consistently having difficulties logging on in a short period, attempting to connect an external device that does not comply with the external plugin policy, or attempting to access files that are not in their authorised permission.
How it Works
BEM collects information in real-time from Becrypt software including Disk Protect, mShare Removable Media and Connect Protect. All data is stored in a database allowing easy central storage, backup and recovery. Auditing events such as password changes, key requests and user recovery are all logged centrally and can be viewed by multiple authorised administrators from multiple locations.
Reporting functionality gives administrators an accurate picture of a devices estate and removable USB storage devices, with details such as the number of encrypted machines and devices, the users who can access them and any external devices that are being blocked.
Who is this suitable for?
For pricing and more information please contact us.