Portal Home |  IS News Menu |  Portal Menu |  ISB Menu |  Main Content
DESlock Goes Enterprise-Wide
06 Jun 03:01

UK-based Data Encryption Systems Limited has released an Administrators Tool for its DESlock data encryption software. This new utility enables IT managers, project managers and team leaders to quickly configure multiple DESlock licenses and to define and manage company-wide groups and user-rights so that specific documents can be viewed only by authorised individuals.

The management and security of sensitive data is a major challenge that small businesses, enterprises and government agencies must address. Windows does not offer IT managers a simple way to establish and automate an encryption policy, and to apply it company-wide to individual users, workgroups or operating units. Despite the efforts of even the most cautious IT manager, information such as personnel records, financial databases, medical information and confidential company reports often resides unencrypted on users computers, and can fall into the wrong hands through security breaches, computer theft or mislaid laptop computers.

The recent PricewaterhouseCoopers and the Department of Trade and Industry Information Security Breaches Survey, published in April 2006, provided evidence of this type of security breach. It highlighted that there has been a significant increase in reported insider attacks, over the past year, resulting in corporate losses. It concluded, with a warning, that companies need to consider security policies that encrypt company data from the inside out as well as the outside in, protecting organisations against this type of threat.

Administrators Tool Key features

  • Centralised acquisition, configuration and distribution of DESlock encryption keys. The application also provides a convenient way for a manager to track which user or department has been assigned a key
  • Creation, assignment and management of user profiles, enabling commonly used configurations to be applied to specific users or groups of users, and the definition and application of access rights, either to individual users or to groups of users
  • Option sets to define and limit functionality that is available for each user. For example, a specific user may be allowed to encrypt and delete folders, but is not permitted to generate new encryption keys.

Related links: (Open in a new window.)
External link www.deslock.com

View Printable View printable version (opens in new window)
Back Back