Managed Encryption Products

A breakdown on managed encryption and how it can help your business?

 

Encryption solutions make sure that your files are secure so only authorised individuals can view any sensitive data. However, encryption solutions can be sometimes difficult to manage and take time away from your teams. A managed encryption solution takes the hassle out of implementing secure encryption across your organisation. This frees up resources so your staff can focus on what is critical to your business.

Please see our full product range below…

Click the icons to see full details

Background

Inspired offer a cost effective, 24/7, hassle-free Managed Encryption solution to meet your compliance needs.

Background

FDR OR FULL DISK ENCRYPTION

What’s Included with Full Disk Encryption?

.

FULL DISK ENCRYPTION

Our Full Disk Encryption provides pre-boot authentication. This enables users to use their own personal credentials and verifies them before the system loads and data becomes accessible.

REMOVABLE MEDIA ENCRYPTION

Your standard encryption products may not cover any data that is on CDs, DVDs, USB drives and other removable data. This leads to having to “stack” different products, which often do not integrate. Our solution is fully comprehensive and can fully encrypt removeable data.

DEVICE CONTROL

With device control, you are able to set policies, which we can manage to enforce security policies, controlling access to removable devices, media DVDs/CDs and USB flash drives, giving flexibility to your data security.

AES 256-BIT ENCRYPTION

Inspired Technology Managed Encryption utilises certified AES 256-bit encryption, which is the gold standard among leading government agencies and corporate enterprise.

REMOVE THE IT OVERHEAD

Inspired Technology Managed Encryption utilises certified AES 256-bit encryption, which is the gold standard among leading government agencies and corporate enterprise.

COMPLIANCE

  Audit functionality and reporting to prove that you have encrypted your data, so that you can establish compliance with regulation and legislation.

24 /7 HELPDESK SERVICES

Our helpdesk is there to support your end users 24/7 meaning they will always be online when they need to be.

KEY MANAGEMENT

Key management is a smart solution that ensures all data can be recovered even if a user forgets their password or leaves the business.

CENTRALISATION OF SECURITY POLICIES

 Inspired Technology Managed Encryption gives centralised policy management so once you define, enforcing and updating your policies becomes seamless across your whole organisation. Users cannot affect or change this allowing specific changes to departments or geographic locations with ease and speed.

SIMPLE EFFORTLESS INSTALLATION

  The installation package run once and it encrypts the entire hard drive to ensure maximum security. Inspired Technology offer an imaging service on all desktops sold so we can offer to add this as an additional free service if requested. Once you receive your machine it will come fully encrypted giving a user friendly setup.

SECURE DISPOSAL

  Inspired Technology Services offer secure asset disposal. Managed encryption adds an extra layer of data security when disposing of your legacy hardware as your devices are encrypted as well as then being securely destroyed

MULTI PLATFORM SUPPORT

Our solution supports both MAC and Windows so having a mixed environment doesn’t mean that you impact your security or have increased administrative difficulty.

What difference does Managed Encryption Make?

 

As a business to manage encryption can take a lot of time, resources and expertise to deploy, maintain and operate effectively. However, to not have your business devices encrypted could be disastrous and costly. If you suffer a data breach, malicious individuals could significantly damage your business’s reputation and finances.
This is not a risk worth taking. Managed Encryption takes the hassle, stress and worry away. Inspired Technology Managed Encryption is a 24/7, hassle free managed solution that will support you in meeting your compliance requirements.

Background

FILE AND FOLDER ENCRYPTION (FFE)

 File and Folder Encryption

 

Simple, and intuitive Inspired FFE give easy to use drag and drop security. With Inspired File and Folder Encryption (FFE), users are given the ability to encrypt selected files and folders on a device or on their network simply by drag and drop.
As a key component of our managed service, Inspired Technology will manage policies, password rules and the encryption across PC, Mac and linux platforms.
The File and Folder Encryption solution utilises the same AES 256-bit encryption that we use for our Full Disk Encryption. File and Folder Encryption adds the ability to encrypt individual files compared to FDE, which encrypts the entire hard drive. This adds an additional layer of security on top of FDE giving “defence in depth”.

So what are the advantages of Inspired File and Folder Encryption?

MANAGED FROM A SECURE CENTRALISED LOCATION

Encryption keys for FFE will be centrally managed and provisioned by Inspired Technology to authorised users.

You, the client, have full control over specifically which files and folders to encrypt. This ensures that compliance for both business security policies and wider regulatory requirements are covered.

SAFE AND SECURE

Files retain encryption even if moved from the encrypted drive. If data is transferred from one drive to another without the encryption read credentials, the data will be unreadable.

This can be utilised on your network as well as your endpoints all with AES 256-bit military grade encryption.


SIMPLE AND SECURE

You do not need to write commands, run difficult scripts or use a confusing interface. Inspired FFE uses a simple and intuitive drag and drop system. This familiar way for users to utilise encryption dramatically reduces training issues when compared to other solutions.




The File and Folder Security module sits neatly within your Full Disk Encryption console. This gives one simple centralised management platform making it easy to use for all policies, password rules and encryption across PC, Mac and Linux.

Background

MOBILE DEVICE MANAGEMENT (MDM)

Securing the Mobile Devices across your Organisation

 

There are many different MDM solutions out there on the market. As the workforce increasingly utilise their smart devices for work more and more corporate data is passing through devices, which are often unsecured.
Inspired Managed Encryption Mobile Device Management gives you the ability to secure mobile devices running both iOS and Android operating systems. Inspired Mobile Device Management expertly makes use of the native security found in both Android and iOS devices. It also gives the enhanced ability to enforce security policies, allowing remote control of passwords and pins, restriction of cameras and remote wipe to name a few of the additional features.

 

QUICK & EASY ENROLMENT
ASSET MANAGEMENT
SECURING MOBILE DATA
24/7 UK SUPPORT
AFFORDABLE
SECURE & FULLY MANAGED
FOR IOS DEVICES

SES MDM Support of iOS devices:

  • • Apple iPhone and iPad running iOS 4 and higher

SES MDM Supported features for iOS devices:

  • • Auto-lock
  • • Encrypted back-up
  • • Enforce password & password quality
  • • Kill pill/remote wipe
  • • Camera & Facetime restrictions
  • • Device wipe based on failed log-in attempts
  • • Password reset & remote unlock

FOR ANDROID DEVICES

 SES MDM support for Android devices:

  • • Android-based tablets running version 3.01 (Honeycomb) and above
  • • Android-based smartphones running version 4.0 (Ice Cream Sandwich) and above

SES MDM Supported features for Android devices:

  • • Kill pill/remote wipe
  • • Camera restrictions
  • • Enforce password & password quality
  • • Device wipe based on failed log-in attempts
  • • Password reset


Background

REMOVABLE MEDIA ENCRYPTION (RME)

CD, DVD, USB, FLASH DRIVES & OTHER REMOVABLE MEDIA ENCRYPTION SOFTWARE

Secure Data on the Go

 

With Inspired Removable Media Encryption and Removable Media Container encryption you can protect sensitive data on portable and removable media sources. This includes CDs, DVDs, USB or flash drives. It encrypts the devices on what is called a sector-by-sector basis. *This solution is recommended just for the removable media. Laptops and desktops need Full Disk Encryption to secure their data.
Removable Media Encryption (RME)

The same robust encryption used in Inspired Full Disk Encryption solution gives businesses the opportunity to fully encrypt CDs, DVDs and USB drives. All removable media relating to read/write to any disk, inclusive of defined restrictions based on encryption status can be managed by ‘Disk Access Control’ functionality. Files loaded or copied are then automatically encrypted without any special requirements made of the end user.




Removable Media Container Encryption (RMCE)

Sometimes you might not want to encrypt all of the USB device. Removable Media Container Encryption is a function of Inspired Managed Encryption that gives users the ability to encrypt a sector of their removable device, leaving the rest of the volume unencrypted for other purposes.

The flexibility of both Removable Media Encryption and Removable Media Container Encryption mean that your organisation can secure its data in a way that does not impact on collaboration and user experience.

Background

SERVER ENCRYPTION

Full Server Encryption to Secure your Infrastructure

 

Inspired Full Server Encryption not only helps you secure all your company data on your servers but also seamlessly supports the management of data protection on your servers.
All departmental servers should always be encrypted. Often simple services such as print services can be forgotten and offer an opportunity for nefarious individuals to steal business and customer sensitive data.

 

IDEAL FOR DEPARTMENTAL SERVERS
SUPPORT FOR TCG ENTERPRISE DRIVES
PRE-BOOT NETWORK AUTHENTICATION
FIPS 140-2, AES VALIDATION
CENTRALLY MANAGED
RAID SUPPORT
SERVER HARDWARE-BASED ENCRYPTION

Full support for TCG Enterprise drives means that with Inspired Managed Encryption for Servers you can take advantage of the latest and most current hardware encryption technology.

Inspired Managed Encryption for Servers is one step beyond standard Full Disk Encryption because your server has different needs and requirements. Fully optimised to address these requirements. Inspired Managed Encryption for Servers is optimised for RAID arrays, remote management, Disk and Port access control and is supported across multiple operating systems giving support for file and folder encryption.

DATA SECURITY

With Inspired Managed Encryption, organisations can lock down a server and prevent the transfer of data to external storage. Inspired Managed Server Encryption not only allows you to completely lock down data from a server but to limit read/write to external media to devices that are encrypted. This means that data flow can be allowed but only when secure. The organisation therefore gets the benefits of having its data secured while the users workflow isn’t negatively impacted.


 

SAFEGUARDING YOUR INTELLECTUAL PROPERTY

 A server is relied upon for different demands versus a traditional desktop PC. Inspired’s Managed Encryption for Servers has been fully optimised to address: RAID arrays, Disk and Port access control, remote management, multiple-OS support and file and folder encryption.

Operating System SecureDoc client for Windows:

  • SecureDoc 7.1 & newer: any 32-bit or 64-bit Windows release from Windows 7 SP1 to Windows 10 Threshold 2
  • SecureDoc 6.5: any 32-bit or 64-bit Windows release from Windows Vista to Windows 8.1
  • SecureDoc 6.1-6.4SR4: any 32-bit or 64-bit Windows release from Windows Vista to Windows 8.1.

SecureDoc client for Windows Server:

  • SecureDoc 6.5 & newer: any 32-bit or 64-bit Windows release from Windows 2008 to Windows 2012 R2
  • SecureDoc 6.1-6.4SR1: any 32-bit or 64-bit Windows release from Windows 2008 to Windows 2012 R2.
RAM 512 MB RAM
Hard Drive 250 MB free space available
CPU Intel, AMD, Cyrix or compatible processor (1 GHz or better). AES-NI is supported only on some Intel CPUs.
UEFI
  • Unified Extensible Firmware Interface (UEFI) is supported starting from SecureDoc 6.1 only on compatible devices.
  • For devices not certified, UEFI must be run in BIOS Compatibility mode.

Background

CLOUDSYNC ENCRYPTION

PROTECTING DATA IN THE CLOUD

Cloud Security by Inspired Managed Encryption

 

CloudSync encryption enforces transparent file encryption on cloud folders.  This is managed by policy and means that data is protected before it leaves an endpoint.
When using Inspired CloudSync, the contents of the cloud storage folder are always encrypted. All synchronisation is transparent and ensures the files remain encrypted in the cloud environment. This means encrypted files remain encrypted thus improving your cloud security.
Inspired CloudSync works over multiple platforms allowing data to securely traverse across Windows, Mac, iOS and Android.
SECURE

All based on a FIPS 140-2 certified 256-bit cryptographic engine.

The encryption takes place at the endpoint so you know that data entering the cloud has been secured and without the right authentication is unreadable. If files are removed from an encrypted drive they remain encrypted in the cloud.

We handle the key management and not third parties so you can be sure your data is secured.

SIMPLICITY

By using a simple drag and drop approach to encrypting files. This is familiar to users and its intuitive nature makes it easy to manage files and folders that need encrypting. This gives maximum functionality, user productivity and a transparent workflow while also ensuring maximum security.

To make things smooth this works across platforms to increase ease of management of mixed environments and user experience.

CENTRALISED MANAGEMENT

Encryption keys are managed and provisioned by Inspired Tech.

Organisations have the ability to select and apply encryption to the entire cloud folder or just to cloud folders containing sensitive business data; this can improve user experience allowing the use of cloud for personal data as well.

 

Data can be transferred and shared transparently between users with the same authorisation access key. To allow data to be shared externally passwords can be set up and file viewers are available for iOS and Android platforms. This gives the ability for users to securely share encrypted data with individuals not covered by Inspired Managed Encryption.
The IT administrators centrally manage your encryption keys and cloud policies giving you full control over data security. IT administrators can easily recover encrypted data and have control of access keys giving peace of mind that they are not in the control of third parties.