Enforced Encryption

Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.

1
Cross-platform solution
2
Password-based protection
3
Military-grade encryption

With accessibility and portability being an important part of our daily work, securing confidential data and transfers has shifted from a “nice to have” to a “must have”. Data stored on computers, on cloud storage or on USB devices can get into the wrong hands and therefore needs to be protected. An easy to use, cross-platform encryption solution is the best way to ensure confidential data will not fall into the wrong hands due to unauthorized access, lost or stolen devices.

EasyLock USB Enforced Encryption combined with Endpoint Protector allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted. As a cross-platform solution, EasyLock can be used on both macOS and Windows computers. Via a secured password, users can safely transfer confidential data and access it on any computers or only on authorized ones. Moreover, some additional useful features are available for IT Administrators like remotely sending messages to the users, requesting a password change or wiping the confidential data in case the device is lost or stolen.

In addition to EasyLock Enforced Encryption for USB devices, Endpoint Protector allows IT Administrators to take advantage of FileVault and enforce encryption on enrolled macOS computers.

How USB Enforced Encryption Works

1
Deploy the Device Control module
2
Enable the feature and push EasyLock to USB devices
3
Data is encrypted automatically when files are transferred
4
Data can be moved securely on other computers

Main Benefits

Additional layer of security

Using Enforced Encryption, users will be authorized to transfer confidential data only on encrypted USB portable storage devices. Data will be safe even if a device is lost or stolen, due to the password-protected encrypted area. 

Compliance with industry regulations

Numerous industry regulations ask for confidential data to be encrypted regardles of where it resides. Enforced Encryption helps being compliant with HIPAA, PCI DSS, SOX, and others, securing USB devices.

Data Leakage Prevention

The Endpoint Protector DLP solution will be enhanced with EasyLock Enforced Encryption, making sure sensitive data is secured and data leakages are avoided. 

Business continuity

Minimize risks of data losses that can affect business due to fines, lawsuits, and negative brand image. Take cake of your business, instead of managing data loss consequences. 

Citrix
VMware Technology Alliance Partner
Microsoft Partner
The Linux Foundation
Our main focus is to develop and deliver flexible, strong, and time-saving solutions, which is why technology partnerships with leading providers are essential for us.
See all technology partners