How to use USB Enforced Encryption from Endpoint Protector DLP suite

Description

The cross-platform USB Flash Enforced Encryption is the module within Endpoint Protector Data Loss Prevention that boosts the security of data copied on USB storage devices through encryption. It will automatically push EasyLock, our AES 256 bits encryption, to connected USB devices if the Endpoint Protector agent is installed on the computer. Remote deployment of EasyLock along with the Site License simplify IT Administrators’ lives. The Enforced Encryption for Windows and Mac OS X represents an additional layer of security for data copied on USB portable storage devices, eliminating the threat of data loss or data theft while supporting employees in tasks continuity.

Transcript

"Hi, I am Zoran. I am going to show you how the USB Enforced Encryption works in Endpoint Protector.

In one of my previous videos, I showed you how to set up the endpoint rights in Endpoint Protector, but we didn`t talk about encrypting the data transfers to USB and other portable storage devices. Besides the classic Deny Access, Allow Access and Read Only Access rights, in Endpoint Protector we have some extra rights called Allow access if TD Level 1 to 4, where TD stands for Trusted Device. These are devices that have some sort of encryption. It can be software encryption, it can be hardware encryption or software and hardware encryption combined.

For example, devices encrypted with BitLocker or FileVault, the native Microsoft and Apple encryption will automatically fall in TD Level 3 category. The only problem with this encryption solution is that neither of them is cross-platform. If I encrypt a USB device with FileVault on a Mac, I won`t be able to use it on a Windows machine and decrypt the data. This is the reason we integrated our cross-platform encryption application - EasyLock- into Endpoint Protector. Every USB device which has the EasyLock encryption application installed on it will fall into Trust Device Level 1 category. Making a USB device of External Hardrive or Trusted Device Level 1 is now easier than ever. All we need to do is select right Allow access if TD Level 1+ and the EasyLock application will be deployed on the device.

Let`s give it a try and see how this works. I am connecting a USB device to my Mac right now. The device will show up in Finder and the EasyLock application is pushed to the device. The EasyLock application will open automatically. The first time it runs the user needs to accept the terms and then set up a password for the device. Now we can log in into the EasyLock application on the device by entering the correct password. On the left side, we can see the computer`s drive and we can transfer data to the right side where the data is encrypted on the USB device. After closing the EasyLock application the data stays inside the encrypted container. The next time when we connect the USB device to the computer the EasyLock application will start automatically.

By entering the correct password we have access to the data which is encrypted on the device. Transferring data to the device is now possible only through the EasyLock application. This way we can make sure the data transfer to the device will be always encrypted. The great advantage of EasyLock compared to FileVault or BitLocker is that EasyLock is a cross-platform solution. I can encrypt the data on a Mac and then decrypt it on a Windows machine just by entering the correct password. Speaking of passwords the Administrator can change the User Password or reset the device is case the sensitive data has been copied to it or it the employee was terminated.

This is how Endpoint Protector and EasyLock Enforced Encryption works.
Thank you for watching!"

Other data security videos

How eDiscovery Works?

eDiscovery scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It…

How Enforced Encryption Works?

Enforced Encryption allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted.…

How Content Aware Protection Works?

Content-aware data loss prevention is a data loss-prevention measure that involves awareness of the context or content that is being protected. This module enables the…

How Device Control Works?

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data…

GDPR Essentials

This video offers a brief overview of what GDPR (General Data Protection Regulation) is and how it translates into actual measures for companies. Find out…

How Endpoint Protector DLP can secure your data on Linux endpoints

See how you can setup Data Loss Prevention policies on Linux endpoints, what exit points Endpoint Protector covers, and what type of sensitive data it…

How to use USB Enforced Encryption from Endpoint Protector DLP suite

The cross-platform USB Flash Enforced Encryption is the module within Endpoint Protector Data Loss Prevention that boosts the security of data copied on USB storage…

Setup a Content Aware Protection (CAP) Policy in Endpoint Protector

Learn how to setup a Content Aware Protection Policy in Endpoint Protector. Prevent confidential information from leaving the endpoint through USB and peripheral ports, printers,…

How to set up rights in Endpoint Protector

In this tutorial, we walk you through and show you how to set up rights in Endpoint Protector. Get a quick insight into Device Rights,…

How to use the Offline Temporary Password (OTP) feature in Endpoint Protector

Learn how to authorize the use of blocked devices (USB Flash Drives, CD/DVD, external HDDs, etc.) with the Offline Temporary Password (OTP) feature when computers…

Mobile Device Management (MDM) for iOS and Android with Endpoint Protector

Secure your mobile iOS and Android devices with Endpoint Protector Mobile Device Management (MDM) and keep a close eye on where devices are going with…

Content Aware Protection to prevent sensitive data leakage through all possible exit points

Content Aware Protection is a module in Endpoint Protector that offers detailed control over sensitive data leaving the company's network.

Endpoint Protector Virtual Appliance for Device Control and DLP

Our virtual appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices.

Endpoint Protector Hardware Appliance for Device Control

Our appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices.

Endpoint Protector for Device Control explained in plain English

With Endpoint Protector you have full control, manageability and transparency of what is happening with USB and peripheral ports on your Windows, Macs, and Linux computers.

Device Control, USB Lockdown, and Control for Mac OS X

Controlling the use of USB, FireWire, Thunderbolt, SD Card Reader, Bluetooth, etc on your Mac is vital to protect your data.

Endpoint Protector Basic - Data Protection for Small Offices or Home Use

Manage and control the use of portable devices with Endpoint Protector Basic, the perfect stand-alone solution for Windows and Mac.

EasyLock - Cross-platform encryption for Windows, Mac OS X, and Linux

Strong military-grade encryption algorithms and an intuitive drag and drop interface, helping anyone turn any portable storage device into a data safe.

My Endpoint Protector explained in plain English - DLP | MDM

Manage portable storage devices, control what data is leaving your network through emails, messengers and other cloud applications and even manage the mobile device fleet.…