HOW TO ENFORCE ENCRYPTION
COMPLIANCE ON THIRD-PARTY DEVICES
AlertSec ACCESS is a patent pending technology. It is designed to enforce that devices are encrypted before access to a network is granted. Encrypted devices secure your data in case a device is lost or stolen. AlertSec ACCESS checks all computers and smartphones and detects all encryption types.
Why you need it
All companies and organizations that normally secure data when stored on servers should also secure that data at the endpoints. The risk of losing a device is far greater than losing a server. If your policy is to secure your network from hackers you should also secure your devices. But not only your devices – you also need to ensure that the devices belonging to your third parties (vendors, contractors, consultants, etc.) are protected. Most devices have seamless login to servers and cloud services. This means that once a perpetrator has access to a unsecured device – everything that device can access put your company at risk.
Computers AND mobile devices supported
AlertSec ACCESS checks for full disk encryption on PCs running Windows 7, 8, and 10 Home, Pro and Enterprise as well as Mac OS El Capitan up to High Sierra. AlertSec ACCESS will also verify that all smartphones running iOS and Android are encrypted before access is granted.
The encryption check is quick and initiates a one-time download of an agent for a device requesting login. Once checked, all following logins will be seamless. AlertSec ACCESS is encryption agnostic and detects any encryption regardless of vendor or OS-native encryption like BitLocker or FileVault2. For smartphones and tablets it also checks for encryption and that Android devices are not rooted. Should a user fail the encryption check there is a redirect where a user can have advice in how to get the device encrypted.