Installation & Administration

Installation

After setting up a new customer account, you will receive an email with login credentials to your AlertSec ACCESS dashboard. The dashboard contains an easy-to-understand implementation guide, as well as the code needed to activate the AlertSec ACCESS on your web portal.

Because the code has a small footprint, the installation is very fast.

For each checked device, the customer dashboard will log and display IP-address, date and time, device ID, operating system and browser. There is aWhite Paper to download under DOCUMENTATION.


Running

Once installed, the portal is secure with AlertSec ACCESS. Each device trying to login will be prompted to download an agent. The size of the computer agent is 15 MB, and needs to be installed with admin rights the first time it is downloaded. For smartphones, an app needs to be downloaded. Once the agent/app is installed, all future encryption checks of this device will be seamless and instant.

From the customer dashboard, you will be able to monitor all login attempts to your portal and monitor the encryption status on each device. Only encrypted devices will be allowed to continue to the login page of your portal.

 


Administration

You do not need to train your technicians to maintain and administrate AlertSec ACCESS. Once installed, it simply blocks unencrypted devices. Real-time monitoring of all device checks is done from the dashboard.

Should there be any technical issues during the installation of the AlertSec ACCESS agent, we have a free 24/7 helpdesk available for all end users. Free phone assistance during set up is also available.

The AlertSec ACCESS agent is available as a generic .msi package, that can be included in a standard build or computer image.


No Device Enrollment

There is no need to enroll any of the devices that you would like to check for encryption status. The AlertSec ACCESS patent pending technology is able to check the encryption status of all devices without having to connect them to a mobile device management solution (MDM). Strong authentication combined with  AlertSec ACCESS keeps track of all devices. You will be certain that every device that logs in to your network is encrypted.


Soft roll-out

The blocking functionality can be turned off.  Customers who would like to start in a “monitoring only” mode will only collect data of encrypted/unencrypted devices.

It is also possible to target specific IP-numbers and later, gradually open up for more IP-numbers to be forced to do the encryption check.


ACCESS Override

The administrator may also override the encryption check in case that is desired. The ACCESS Override can also be delegated to AlertSec’s 24/7 support.


Settings

From the “Settings” page, you can easily control AlertSec ACCESS.

 


Browsers and operating systems

AlertSec ACCESS supports Edge, Internet Explorer, Chrome, Firefox and Safari.

AlertSec ACCESS checks for full disk encryption on PCs running Windows 7,8, and 10 Home, Pro and Enterprise, as well as Mac OS El Capitan and Sierra. AlertSec ACCESS will also verify that all smartphones running iOS and Android are encrypted before access to a network is granted.


Encryption detection

The encryption check is quick and consists of a one-time download of an agent. Once checked, the next login will be seamless. The agent contains the AlertSec ACCESS patent pending technology, that enables you to verify that a device is encrypted.

AlertSec ACCESS is encryption agnostic and will detect any encryption, regardless of vendor or OS-native encryption, like BitLocker or FileVault2.

For smartphones running iOS and Android, AlertSec ACCESS verifies that the pass code is activated and that the device is encrypted before access is granted to a network. It also checks that Android devices are not rooted. In the case a device fails the encryption check, AlertSec can provide help and assistance in getting the device encrypted.

Once the encryption check agent is downloaded and installed on a device, the agent can be re-used for device encryption checks on other websites/portals running the AlertSec ACCESS technology. The device needs admin rights to install the encryption check agent on computers, but no admin rights are needed to run the encryption check.

There is no speed degradation on the device due to the encryption check. After the agent has performed the encryption check it remains inactive until next time an encryption check is prompted.


Workflow

This is the workflow for a device that wishes to login:

 

AlertSec ACCESS is encryption and device agnostic and will detect any encryption on computers, smartphones and tablets, regardless of vendor or OS-native encryption, like BitLocker or FileVault2.


AlertSec ACCESS Servers

Each time a new device requests to login to a customer website/portal, a connection is made to the AlertSec ACCESS server. That triggers a download of the encryption check agent. The AlertSec ACCESS runs on a dedicated server, placed in the USA, with mirroring as well as redundant backup.

The first time a device is checked for encryption, a cookie is set. The device can thereafter login without having to request an OK from the AlertSec ACCCESS Server for each login. The cookie expires after 30 days (can be altered). When the cookie expires a new encryption verification is made to renew the cookie.


VPN

AlertSec ACCESS does not have an API for existing VPN-clients, but is willing to develop this functionality should there be a specific customer need.


Updates

Updates to the AlertSec ACCESS encryption check agent on each device is done automatically after approval by the customer from the dashboard.


White Paper

A white paper can be downloaded under DOCUMENTATION.