A breakdown on managed encryption and how it can help your business…
.
Our Full Disk Encryption provides pre-boot authentication. This enables users to use their own personal credentials and verifies them before the system loads and data becomes accessible.
With device control, you are able to set policies, which we can manage to enforce security policies, controlling access to removable devices, media DVDs/CDs and USB flash drives, giving flexibility to your data security.
Inspired Technology Managed Encryption utilises certified AES 256-bit encryption, which is the gold standard among leading government agencies and corporate enterprise.
Inspired Technology Managed Encryption utilises certified AES 256-bit encryption, which is the gold standard among leading government agencies and corporate enterprise.
Audit functionality and reporting to prove that you have encrypted your data, so that you can establish compliance with regulation and legislation.
Our helpdesk is there to support your end users 24/7 meaning they will always be online when they need to be.
Key management is a smart solution that ensures all data can be recovered even if a user forgets their password or leaves the business.
Our solution supports both MAC and Windows so having a mixed environment doesn’t mean that you impact your security or have increased administrative difficulty.
Inspired Technology Managed Encryption gives centralised policy management so once you define, enforcing and updating your policies becomes seamless across your whole organisation. Users cannot affect or change this allowing specific changes to departments or geographic locations with ease and speed.
The installation package run once and it encrypts the entire hard drive to ensure maximum security. Inspired Technology offer an imaging service on all desktops sold so we can offer to add this as an additional free service if requested. Once you receive your machine it will come fully encrypted giving a user friendly setup.
Your standard encryption products may not cover any data that is on CDs, DVDs, USB drives and other removable data. This leads to having to “stack” different products, which often do not integrate. Our solution is fully comprehensive and can fully encrypt removeable data.
Inspired Technology Services offer secure asset disposal. Managed encryption adds an extra layer of data security when disposing of your legacy hardware as your devices are encrypted as well as then being securely destroyed
Encryption keys for FFE will be centrally managed and provisioned by Inspired Technology to authorised users.
You, the client, have full control over specifically which files and folders to encrypt. This ensures that compliance for both business security policies and wider regulatory requirements are covered.
Files retain encryption even if moved from the encrypted drive. If data is transferred from one drive to another without the encryption read credentials, the data will be unreadable.
This can be utilised on your network as well as your endpoints all with AES 256-bit military grade encryption.
You do not need to write commands, run difficult scripts or use a confusing interface. Inspired FFE uses a simple and intuitive drag and drop system. This familiar way for users to utilise encryption dramatically reduces training issues when compared to other solutions.
The same robust encryption used in Inspired Full Disk Encryption solution gives businesses the opportunity to fully encrypt CDs, DVDs and USB drives. All removable media relating to read/write to any disk, inclusive of defined restrictions based on encryption status can be managed by ‘Disk Access Control’ functionality. Files loaded or copied are then automatically encrypted without any special requirements made of the end user.
Sometimes you might not want to encrypt all of the USB device. Removable Media Container Encryption is a function of Inspired Managed Encryption that gives users the ability to encrypt a sector of their removable device, leaving the rest of the volume unencrypted for other purposes.
The flexibility of both Removable Media Encryption and Removable Media Container Encryption mean that your organisation can secure its data in a way that does not impact on collaboration and user experience.
Full support for TCG Enterprise drives means that with Inspired Managed Encryption for Servers you can take advantage of the latest and most current hardware encryption technology.
Inspired Managed Encryption for Servers is one step beyond standard Full Disk Encryption because your server has different needs and requirements. Fully optimised to address these requirements. Inspired Managed Encryption for Servers is optimised for RAID arrays, remote management, Disk and Port access control and is supported across multiple operating systems giving support for file and folder encryption.
With Inspired Managed Encryption, organisations can lock down a server and prevent the transfer of data to external storage. Inspired Managed Server Encryption not only allows you to completely lock down data from a server but to limit read/write to external media to devices that are encrypted. This means that data flow can be allowed but only when secure. The organisation therefore gets the benefits of having its data secured while the users workflow isn’t negatively impacted.
 
Operating System | SecureDoc client for Windows:
SecureDoc client for Windows Server:
|
RAM | 512 MB RAM |
Hard Drive | 250 MB free space available |
CPU | Intel, AMD, Cyrix or compatible processor (1 GHz or better). AES-NI is supported only on some Intel CPUs. |
UEFI |
|
All based on a FIPS 140-2 certified 256-bit cryptographic engine.
The encryption takes place at the endpoint so you know that data entering the cloud has been secured and without the right authentication is unreadable. If files are removed from an encrypted drive they remain encrypted in the cloud.
We handle the key management and not third parties so you can be sure your data is secured.
By using a simple drag and drop approach to encrypting files. This is familiar to users and its intuitive nature makes it easy to manage files and folders that need encrypting. This gives maximum functionality, user productivity and a transparent workflow while also ensuring maximum security.
To make things smooth this works across platforms to increase ease of management of mixed environments and user experience.
Encryption keys are managed and provisioned by Inspired Tech.
Organisations have the ability to select and apply encryption to the entire cloud folder or just to cloud folders containing sensitive business data; this can improve user experience allowing the use of cloud for personal data as well.