HOW IT WORKS
Full Disk Encryption powered by Check Point automatically protects all saved data on your computer
so you can comply with privacy regulations such as HIPAA, PCI and SOX.
CEO
HOW IT WORKS
The AlertSec service protects your information and helps your business comply with regulatory requirements. It provides a remote lock down of a stolen device as well as proof of encryption in order to avoid fines or law suits. AlertSec provides a complete software security solution, which includes web management and 24/7 telephone support for all users and administrators.
Follow these simple steps to get started:
Sign up
Sign up for a 7-day free trial or order your subscription online. You get an instant download of the encrypting agent as well as access to an AlertSec web account which allows you to add more computers.
Web account
Your web account lets you manage the AlertSec service. The dashboard provides functions to manage your subscription in order to add/delete users.
Add more users
The only information needed to add more users is: first name, last name, phone number and email address.
Deploying computer security to additional users just takes a few clicks.
- Select the user/users you want to deploy the service to.
- Select the service and policy you want to deploy.
- The selected users receive an email with a download link. Users will need to click on the link in order to install the service on their computer.
For larger deployments it’s possible to bulk import user details. Contact info@alertsec.com for more information about bulk import.
Install
All users can handle the step-by-step installation without any technical knowledge.
- Each user will have to answer three security questions before the installation starts. This information is used for authentication in case they call the AlertSec 24/7 helpdesk.
- An encryption agent is installed on the computer.
- The initial encryption will take some time, but this process is done in the background. The user can still work on the computer and even shut it down without affecting the encryption process.
Monitor
You can follow the deployment progress from your web account. The web account gives you full visibility and traceability. The deployment status of each user is clearly presented in the dashboard.
Compliance and reporting
There are several reports generated monthly by the system in order for you to proove that your computers are encrypted. It is also possible to generate specific compliance reports at any time, providing the information needed for HIPAA, GDPR, PCI and SOX requirements.
24/7 support
The AlertSec helpdesk provides a 24/7 telephone and email technical support for all end users and administrators.