SecureDoc: Making BitLocker simple, smart and secure for you. Your guide to encryption success

Similar documents
Perfect Balance of Public and Private Cloud

Choosing a Full Disk Encryption solution. A simple first step in preparing your business for GDPR

Mobile Data Security Essentials for Your Changing, Growing Workforce

A Guide to Managing Microsoft BitLocker in the Enterprise

Evolution For Enterprises In A Cloud World

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Disk Encryption Buyers Guide

10 Cloud Myths Demystified

Transformation Through Innovation

MODERNIZE INFRASTRUCTURE

The Road to a Secure, Compliant Cloud

Windows Server The operating system

Design and deliver cloud-based apps and data for flexible, on-demand IT

Security Challenges: Integrating Apple Computers into Windows Environments

Crash course in Azure Active Directory

Best Practices in Securing a Multicloud World

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

Accelerate Your Enterprise Private Cloud Initiative

Run the business. Not the risks.

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Choosing the Right Cloud Computing Model for Data Center Management

DATACENTER SERVICES DATACENTER

10 Cloud Myths Demystified

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

Symantec Network Access Control Starter Edition

Google Identity Services for work

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Cisco Start. IT solutions designed to propel your business

SIEM: Five Requirements that Solve the Bigger Business Issues

Cognizant Cloud Security Solution

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

Optimisation drives digital transformation

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

PSN compliant remote access. Whitepaper

Why is Office 365 the right choice?

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Vision of the Software Defined Data Center (SDDC)

Code42 Defines its Critical Capabilities Methodology

Evolved Backup and Recovery for the Enterprise

McAfee epolicy Orchestrator

Five Reasons It s Time For Secure Single Sign-On

Securing Today s Mobile Workforce

Backup and Recovery. Backup and Recovery from Redstor. Making downtime a thing of the past Making downtime a thing of the past

Next-Generation HCI: Fine- Tuned for New Ways of Working

Enhancing Virtual Environments

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Endpoint Protection with DigitalPersona Pro

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

The Data Protection Rule and Hybrid Cloud Backup

Managing the Risk of Privileged Accounts and Passwords

May 2016 If you have questions regarding a particular customer situation, please reach out to DL-SYMC- Encryption-Ask-PM for guidance.

Cloud Computing: Making the Right Choice for Your Organization

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Oracle Buys Automated Applications Controls Leader LogicalApps

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Make security part of your client systems refresh

White Paper Server. Five Reasons for Choosing SUSE Manager

Enterprise Mobility Management

Why Enterprises Need to Optimize Their Data Centers

Made for the way you work: Big ideas and innovation from Windows 10 and Lenovo

Six steps to control the uncontrollable

IT Consulting and Implementation Services

Symantec Network Access Control Starter Edition

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Sales Presentation Case 2018 Dell EMC

5 Steps to Government IT Modernization

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

How to master hybrid IT. Get the speed and agility you want, with the visibility and control you need

Secure Access & SWIFT Customer Security Controls Framework

The Nasuni Security Model

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Overview. Business value

Three Steps Toward Zero Downtime. Guide. Solution Guide Server.

The Three Data Challenges

Virtual Machine Encryption Security & Compliance in the Cloud

Controlling Costs and Driving Agility in the Datacenter

OPTIMISATION DE VOTRE SAUVEGARDE. Daniel De Prezzo Technical Sales & Services Presales Manager Symantec

The Common Access Card The problems it solves (and the ones it doesn t) Quest Software/One Identity Dan Conrad Federal CTO

Data Management and Security in the GDPR Era

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

The SD-WAN security guide

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.

Securing Digital Transformation

Windows in the enterprise

Taming the Mobile File Sharing Beast

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Digital Co-Creation with Hybrid IT. Fujitsu World Tour 2017

IBM PowerSC. Designed for Enterprise Security & Compliance in Cloud and Virtualised environments. Highlights

BUILDING A PATH TO MODERN DATACENTER OPERATIONS. Virtualize faster with Red Hat Virtualization Suite

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

Transcription:

SecureDoc: Making BitLocker simple, smart and secure for you Your guide to encryption success 1

It s time to unlock unbelievable new BitLocker advantages There is an encryption management solution out there that can help you effortlessly protect and take back control of your entire IT environment, including BitLocker. It can support you to not just deliver regulatory compliance but prove it, while cutting encryption management costs across your IT estate and ensuring a competitively seamless user experience. The solution s name is the SecureDoc Enterprise Server. It comes from the encryption leaders at WinMagic and supports more hardware and software platforms than any other solution out there. It s the simple way to manage everything encryption, regardless of the platform, file or device type, helping you to: Dramatically cut the cost of managing encryption across platforms Close the compliance gaps that BitLocker leaves and cut the risk of penalties Simplify management and reduce encryption helpdesk workloads Deliver a great user experience supporting uptime and collaboration This handy guide walks you through the challenges and opportunities, showing you how you can take BitLocker from good to great. 2

Doesn t Microsoft BitLocker alone offer good enough protection? The short answer is no. BitLocker is great solution, doing the focused work it specializes in brilliantly: delivering fast, integrated encryption protection for Windows environments. But BitLocker only covers Windows devices and also requires tools to enforce and prove compliance in the case of device loss or theft. Plus, it s costly to manage and uses complex PINS which get in the way of user productivity and workflows. Your enterprise doesn t operate on only one platform or restrict data access to corporately owned devices. So, it makes sense that relying solely on the native encryption protection offered by BitLocker will leave you with significant security and compliance gaps. Let s take a closer look at the pros and cons of BitLocker. 3

BitLocker does some stuff well. But it needs support. Pros Cons Native: Because it s built-in OS encryption, it delivers better performance and compatibility than most third-party solutions Complementary: Some basic management tools are already included in MDOP for Windows Software Assurance/Volume Licensing customers Integrated: BitLocker is supported in Microsoft Azure with Azure Disk Encryption Costly: Needs a lot of IT Helpdesk and management support; cannot manage macos or Linux devices Compliance gaps: BitLocker - with or without MBAM - can easily be disabled or suspended by certain users and applications, so you can;t use it on it s own to demonstrate devices are in a compliant state after deployment Management complexity: Managing it requires a minimum of two servers and relies on open and insecure Group Policy Objects to manage data protection policies User experience: BitLocker without PIN authentication offers the lowest level of data protection, but with a PIN it s disruptive to users Just add WinMagic and this picture is radically transformed. 4

Close down compliance gaps, once and for all. Let s be frank: the main reason anyone deploys encryption is compliance. It s the number one driver for new installations and with GDPR now live, it continues to be a top IT concern. Because BitLocker doesn t come with centralized management, visibility and control, you can t use it to prove encryption protection, in the way regulators require. Any user with privileged administration rights can tamper with encryption settings and disable BitLocker, for malicious reasons or just because they find the complex PIN access obstructive or irritating. An easy fix comes with integrating BitLocker with the SecureDoc Pre-Boot Protection and Monitoring solution from WinMagic, we like to call SecureDoc On Top. This supports compliance across platforms, including FileVault2 for macos and SEDs (Self Encrypting Drives), all managed from one unified and alwayscompliant dashboard. Prevent tampering: Block users from accidentally or maliciously disabling BitLocker protection Reinforce protection: Stop BitLocker being thwarted by passware and hardware vulnerabilities with robust pre-boot protection and MFA smartcard support Govern and protect your mobile workforce: With remote device management Enable detailed, real-time reporting: Proven to cut reporting time by as much as 60%, while providing the details needed for audits like historical data and user login activity 5

Take back control of spiralling encryption cost Managing encryption keys is seriously difficult and costly across today s typically complex IT infrastructure. Managing BitLocker requires an investment in multiple new servers and hardware drivers and you still end up with a solution that leaves compliance gaps. Adding WinMagic SecureDoc agent top of your encryption environment is the secret to improving encryption ROI across BitLocker and beyond. It gives you unrivalled intelligent key management tools that help you significantly reduce encryption effort and expense across platforms, improving ROI. SecureDoc always automatically opts for the best encryption available on your devices, for the best security at no added cost. Unify how you manage encryption: One centralized console lets you discover, protect and manage all your devices, including those running BitLocker or FileVault 2 for macos Make your investments work harder: Deliver a valuable, unified view of company-wide data encryption without extra server, driver or upgrade expense Drive up productivity: SecureDoc enhances BitLocker so it delivers both seamless and secure user authentication, freeing your people to get on with business. 6

Effortlessly manage diverse and growing endpoints BitLocker is a great foundation for Windows security. However, the lack of centralized management can leave you struggling with huge numbers of low-level helpdesk tasks such a password resets. Deploying SecureDoc is proven to help you conquer helpdesk workloads, cutting time spent on those low-level tasks by as much as 75%. WinMagic also has strategic partnerships with thought-leaders such as Ivanti and SWIMAGE, helping to keep workloads encrypted and compliant during patches, upgrades and migrations especially critical if you work in data-sensitive sectors such as healthcare or finance. Simplify deployment: Transform slow TPM activation, device provisioning and user registration with automated deployment and transparent user adoption. Manage users, not devices: Be empowered to simply add or remove Active Directory users to BitLocker-enabled devices, no PINs required. Speed secure OS migration: Encrypted drives can add 12-24 hours to OS deployment and migration. With SecureDoc and SWIMAGE, it s done in as little as one hour. 7

Transform user experience and adoption In this new competitive era, security designed to liberate productivity, not hamper it, is the must-have. As a result, the user now takes a lead role on the security stage. Some enterprises even elect user groups to help influence and ensure more UX-friendly IT purchase decisions. BitLocker is great for locking down Windows, but it s not built with the user experience in mind. In fact, users need to remember lots of different and complex PINs to log on to every single device. Why trade-off security with a great user experience? The SecureDoc pre-boot client sits effortlessly on top of BitLocker encryption, ensuring seamless access and uptime, letting you upgrade encryption protection without slowing down productivity. Friction-free working: Forget tricky 16-character PINs and multiple log-ons. A single sign-on and wireless networking eliminate friction points and improve uptime, all while leverging fast built-in BitLocker encryption. Collaboration first: Securely exchange data across Windows and macos devices, regardless of whether encryption is installed. Faster recovery: Store recovery keys in a separate secure database rather than Active Directory, with multiple fast recovery options also relieving helpdesk loads. 8

Why partner with WinMagic? As respected industry leaders in intelligent encryption management, WinMagic always works ahead of the curve. Our home base in software encryption has evolved over the last two decades to now embrace laptops, servers, removeable media, data centres, hybrid cloud, virtual workloads and, most recently, hyper-converged infrastructures. Beyond products, we offer true partnership. Not a one-stop solution, but strategic advice and an aligned approach that will support you as your business grows and technology innovation evolves. Partner us and you get roadmaps to reality designed for ambitious enterprises that know where they re heading and need the right, progressive IT support. Want to know more about better managing BitLocker and your whole encryption environment with WinMagic? We d love to hear from you. Simply get in touch: Sales@winmagic.com info@winmagic.com www.winmagic.com 9 US & Canada +1 888 879 5879 United Kingdom +44 0148 334 3020 Germany +49 69 175 370 530 Japan +03 5403 6950 India +91 124 4696800 APAC Singapore +65 9634 5197