Centralized management for self-encrypting drives

Credant Technologies announced Credant Enterprise Edition 7.3, which includes improved features and functionality to help organizations meet their growing needs for protecting data across multiple devices and platforms, including OPAL compliant Self-Encrypting Drives (SEDs), and delivers enhanced protection for removable media.

Credant’s solution delivers patented real-time data-centric disk encryption to more than ten million devices worldwide while addressing today’s biggest enterprise security issue, managing the security of sensitive data, whether it is located on laptops, smartphones, removable media or private or public cloud infrastructures.

Responding to the surge of high profile, costly 2011 data breaches, along with increasingly rapid adoption of bring your own device (BYOD), the latest enhancements to Credant Enterprise Edition 7.3 help companies manage these and other challenges with features that include:

Management for self-encrypting drives
Companies can now integrate the management of SEDs into the same console managing all other protected platforms including file/folder, BitLocker, removable media, smartphones and Virtual Desktop Image (VDI).

The integrated management console helps organizations more effectively utilize and manage the growing number of hardware-based full disk encryption devices in employees’ PCs and laptops.

Additionally, administrators can now remotely manage users, wipe or disable devices as need be and remotely unlock them for patching and maintenance.

Windows Server 2008 data protection
Addressing the growing concern of data on servers, this new version adds the ability to protect information on Windows Server 2008, even if data is being transferred onto removable media.

This latest enhancement extends Credant’s data-centric approach to include protection of physical and virtual servers, where sensitive data often resides.

External media port control
Enhanced controls for removable media reduce the burden on IT by centrally deploying, managing and enforcing encryption and port control policies across the organization.

Don't miss