How Enforced Encryption Works?

Description

Enforced Encryption allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted. The solution can be used on both macOS and Windows computers.

Transcript

Hi! My name is Natalie, and today we’ll take a look at the Enforced Encryption functionality of Endpoint Protector.

The Enforced Encryption functionality is enabled from Device Control, by assigning the “Allow Access if device is Trusted Device Level 1+” right to USB Storage Devices, - on Global/Group/Computer or User level. As soon as the user connects their USB device to their computer where the Endpoint Protector client is installed, the encryption application called EasyLock will be automatically pushed onto the device, prompting the user to define a password for the application.

After the EasyLock application has been successfully installed on the USB, the user can copy files from their computer inside the encrypted container of the device, this way making sure those files are safe and not accessed by any other person that might get a hold of the USB drive, without knowing the password.

Using the Enforced Encryption functionality gives the administrator the possibility to centrally manage the encrypted devices, by changing user's password, resetting the device, sending messages etc.

Compared to FileVault or BitLocker, the EasyLock encryption application is cross-platform, - so a user can encrypt files on a Mac and decrypt them on a Windows machine.

That was the Enforced Encryption functionality of Endpoint Protector.
Thank you for watching!

Other data security videos

How Enforced Encryption Works?

Enforced Encryption allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted. The solution can be used on both macOS and Windows computers.

How Enforced Encryption Works?

Enforced Encryption allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted. The solution can be used on both macOS and Windows computers.

How Enforced Encryption Works?

Enforced Encryption allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted. The solution can be used on both macOS and Windows computers.

How Enforced Encryption Works?

Enforced Encryption allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted. The solution can be used on both macOS and Windows computers.

How Enforced Encryption Works?

Enforced Encryption allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted. The solution can be used on both macOS and Windows computers.

How Enforced Encryption Works?

Enforced Encryption allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted. The solution can be used on both macOS and Windows computers.

Request Demo
check mark

Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.

* Your privacy is important to us. Check out our Privacy Policy for more information.