Admins Gain Control of User Access to Encrypted Containers
HELSINKI, Finland--(BUSINESS WIRE)--Jetico, long-trusted pioneer in data encryption, announced today an update to their BestCrypt Container Encryption – Enterprise Edition. Admins of Jetico’s solution to encrypt selected files and folders can now manage encryption keys permissions by granting and revoking user access to encrypted containers.
“Our customers demand compliance. Managing who has access to sensitive files is key to delivering a successful solution,” states Akram Khazi, CEO of RAS Infotech, Jetico Partner in Middle East. “With this update, BestCrypt empowers company admins to control and monitor user access to encrypted containers – and be sure to follow the most stringent regulations.”
With Jetico Central Manager (JCM), part of BestCrypt Container Encryption – Enterprise Edition, admins can control user access to encrypted containers. To enable this feature, each BestCrypt user is required to select their own password that generates a set of unique encryption keys – key pair of public and private keys. All users are visible in the JCM Console and admins can manage encryption keys permission to sensitive containers simply by checking or unchecking corresponding boxes. For users, their one unique password is used to access all containers with permission.
Jetico CEO, Michael Waksman focuses on the user advantages telling, “This update benefits both end-users and admins. While users only need to remember their own password to access any sensitive files, admins will gain a more efficient way to control access. Removing access for former employees is done in one click – eliminating the burden of resetting all company passwords.”
For over 20 years, Jetico proudly serves enterprise customers with BestCrypt Container Encryption to protect data from threats. Central management of BestCrypt saves time and money, and delivers more convenient compliance for regulations like GDPR, HIPAA and CCPA by offering:
- Remote management of encryption
- Status reports on encryption and policy compliance
- Recovery keys automatically stored in JCM encrypted database
Waksman concludes, “Demand for this new feature is even greater when talking about remote work. Devices are moving away from more protected office environments – which exposes sensitive data to more threats. Jetico’s user-based access management helps mitigate these risks.”
Jetico provides complete endpoint data protection software for National Security, Compliance and Personal Privacy. Trusted for over 15 years by the U.S. Department of Defense, Jetico's BCWipe can wipe selected files beyond forensic recovery such as in response to classified data spills, while BCWipe Total WipeOut can erase hard drive data entirely such as for disposal or decommission. To protect stored data, Jetico's BestCrypt delivers compliant data encryption software for whole disks, virtual drives and selected files or folders. Jetico Enterprise Editions include central management for client software control.
Jetico products are trusted by government and military agencies, all of the top 10 U.S. defense contractors, many national laboratories, as well as various other enterprises and a wide global base of home and small business users in over 100 countries. Founded in 1995, Jetico is privately held and headquartered in the Otaniemi Science Park in Helsinki, Finland. For more information, please visit jetico.com.
Marketing Manager, Jetico
Phone (U.S.): +1 202 742 2901
Phone (Europe): +358 92 517 3030