Becrypt has announced the availability of a disk encryption solution that supports multiple devices from a single software platform. Becrypt DISK Protect v8.1 supports a range of Windows 7 and Windows 8 devices including tablets, laptops, desktops and servers. The software comes with three implementation modes to support differing security policy requirements, making the solution suitable for public sector organisations handing OFFICIAL data, as well as for commercial organisations. This release is Becrypt’s response to the growth in interest in the tablet form factor and the desire to be able to secure all devices with a single solution.
Becrypt customers can now mix and match devices from multiple manufacturers (including all of the major tablet manufacturers, supporting the now pervasive UEFI BIOS) and use one easy to manage product which integrates with Becrypt’s media and device control capability.
Dr. Bernard Parsons, CEO of Becrypt stated; “With the maturity of tablet technology today, we are seeing many more uses for the devices within enterprise and government markets. However, from a security perspective, tablets are disruptive, introducing new threats and new technical challenges, such as authenticating outside of the operating system, securing new forms of BIOS and dealing with the increased portability and vulnerability of potentially large amounts of data.”
DISK Protect v8.1 is available is several configurations that include standard – ideal for commercial and lower threat environments, CPA Foundation and CPA Augmented which are suitable for higher security requirements. DISK Protect generates its own key material making it extremely cost effective for public sector organisations.
Parsons continued; “DISK Protect 8.1 is a major step forward in Becrypt’s provision of security solutions for tablets. Its release is timely given that the UK Government has just updated its End User Device (EUD) strategy to support and encourage adoption of more diverse platforms. The EUD strategy provides a framework for organisations to examine how the benefits of mobile technology can be realised through informed risk management, delivering appropriate security controls that keep the usability and cost effectiveness of systems as key goals. As a result, we expect to see a greater adoption of tablets in the security conscious business market.”