Becrypt Enterprise Manager

Centralised management and audits of your Becrypt data security products including user activity and risk assessments. Contact us for pricing.

Category: Brand:
Product Information

Centralised Becrypt Management

Becrypt Enterprise Manager (BEM) allows you to comprehensively manage your Becrypt Protection Suite of products:

  • Disk Protect
  • Connect Protect
  • mShare

BEM enables you to easily create and apply policies, carry out fast risk assessments in the event of a lost or stolen device, easily address problems such as forgotten passwords, and aids in the set up and quick deployment of Becrypt software to your IT estate.

BEM’s user management permits administrators to remove and control different levels of user access to devices and data.

Audit Trail

Every user event is logged and reported in the BEM database, for quick auditing, and a full view of end user events and usage. BEM makes it straightforward to comply with data policies set by organisations and industries.

User Access & Passwords

Administrators can remove and control different levels of user access to devices and data. A password policy manager is integrated within user management, and in the event of device loss or theft, administrators can access device management to view encryption status and protect data.


A notification is sent to the administrator when a user is consistently having difficulties logging on in a short period, attempting to connect an external device that does not comply with the external plugin policy, or attempting to access files that are not in their authorised permission.

How it Works

BEM collects information in real-time from Becrypt software including Disk Protect, mShare Removable Media and Connect Protect. All data is stored in a database allowing easy central storage, backup and recovery. Auditing events such as password changes, key requests and user recovery are all logged centrally and can be viewed by multiple authorised administrators from multiple locations.

Reporting functionality gives administrators an accurate picture of a devices estate and removable USB storage devices, with details such as the number of encrypted machines and devices, the users who can access them and any external devices that are being blocked.

Who is this suitable for?

For pricing and more information please contact us.

Request a Free Trial GET IN TOUCH


  • Full visibility and control of user activity
  • Fast risk assessments
  • User friendly views of licenses
  • Quick view deployed security products
  • Proactive notifications function

User Management

  • Aids in the set up and simultaneous mass deployment of Disk Protect
  • Existing Active Directory user and machine hierarchies can be imported
  • Remotely add and remove user access
  • New users can be added quickly and existing users can be deleted
  • User passwords can be remotely reset via device recovery

Key Management

  • Keys are stored centrally in the encrypted Enterprise Manager database
  • When using Removable Media, keys are stored in the users’ profile and automatically made available when the user logs on

Audit and Reporting

  • Real time audit trail of events
  • Events can be archived or deleted
  • Administrators can set email notification warnings of irregular events
  • Library of pre-defined reports providing high level in-depth information
  • Full search facility allows lost/stolen laptops to be quickly identified and encryption status immediately obtained


  • Minimum processor: 2.5 GHz
  • Minimum RAM: 2GB
  • Minimum Hard Disk space: 40 – 50MB

Operating System

Enterprise Manager Server:

  • Microsoft Windows Server 2012 (64bit)
  • Microsoft Windows Server 2008 R2 (64bit)
  • Microsoft Windows Server 2008 (32bit and 64bit)

Enterprise Manager Console

Managed Recovery Console:

  • Microsoft Windows Server 2012 (64bit)
  • Microsoft Windows Server 2008 R2 (64bit)
  • Microsoft Windows Server 2008 (32bit and 64bit)
  • Microsoft Windows 8.0 (32bit and 64bit)
  • Microsoft Windows 7 (32bit and 64bit)
  • Microsoft Windows XP (32bit)


  • SQL Server 2014 (64bit)
  • SQL Server 2012 (64bit)
  • SQL Server 2008 R2 (64bit)
  • SQL Server 2008 (32bit and 64bit)

User Guides & Manuals