Admins Gain Control of User Access to Encrypted Containers
“Our customers demand compliance. Managing who has access to sensitive files is key to delivering a successful solution,” states Akram Khazi, CEO of RAS Infotech, Jetico Partner in the Middle East. “With this update, BestCrypt empowers company admins to control and monitor user access to encrypted containers – and be sure to follow the most stringent regulations.”
With Jetico Central Manager (JCM), part of BestCrypt Container Encryption – Enterprise Edition, admins can control user access to encrypted containers. To enable this feature, each BestCrypt user is required to select their own password that generates a set of unique encryption keys – key pair of public and private keys. All users are visible in the JCM Console and admins can manage encryption keys permission to sensitive containers simply by checking or unchecking corresponding boxes. For users, their one unique password is used to access all containers with permission.
Read More: How Industries are embracing Automation amidst the COVID-19 crisis
Jetico CEO, Michael Waksman focuses on the user advantages telling, “This update benefits both end-users and admins. While users only need to remember their own password to access any sensitive files, admins will gain a more efficient way to control access. Removing access for former employees is done in one click – eliminating the burden of resetting all company passwords.”
For over 20 years, Jetico proudly serves enterprise customers with BestCrypt Container Encryption to protect data from threats. Central management of BestCrypt saves time and money, and delivers more convenient compliance for regulations like GDPR, HIPAA and CCPA by offering:
- Remote management of encryption
- Status reports on encryption and policy compliance
- Recovery keys automatically stored in JCM encrypted database
Read More: Cloud Migration and its Evolving Challenges
Waksman concludes, “Demand for this new feature is even greater when talking about remote work. Devices are moving away from more protected office environments – which exposes sensitive data to more threats. Jetico’s user-based access management helps mitigate these risks.”