Disk Encryption

Secure your data wherever it travels with full disk encryption using Becrypt Disk Protect

The Key Benefits of our Disk Encryption Services

  • Transparent Protection

  • Tablets Supported

  • Encrypt Removeable Media

  • Pre-boot Authentication

  • Two-factor Authentication

  • Single Sign-on

Disk Encryption

Becrypt DISK Protect is an assured full disk encryption solution securing data on touch-screen tablets, laptops, desktops, servers and removable media from theft and loss. Devices can be encrypted at any time and once installed, all data is encrypted transparently, allowing authorised users to access data without impact on performance.

A removable media module enables the full encryption of data written to removable media, and may either employ a personal Encryption Key or a shared Encryption Key allowing authorised users to exchange protected data.

Technical Overview

Read all about our Disk Encryption services

  • Transparent Protection

    Devices can be encrypted at any time and once installed, all data is encrypted transparently, allowing authorised users to access data without impact on performance.

  • Supporting Touchscreen Tablets.

    Becrypt’s Disk Protect offers end point protection for a wide range of commercial and ruggedized tablets running either Windows 7, Windows 8 or Windows 10.

  • Central Management

    Centralised roll-out of DISK Protect saves time and minimises end user involvement.

Becrypt Disk Protect Variants

  • Standard

    Suitable for lower threat environments including commercial and government organisations where FIPS 140-2 is sufficient. Centralised management, one factor authentication and single sign-on ensure that it is easy to deploy, manage and use.

  • CPA

    Suitable for organisations that require accreditation (including government, military and NATO organisations), but also available for commercial entities that demand more confidence in their security product. Approved to protect OFFICIAL data within the new UK Government Classification Scheme (GSC), without the need for CESG sales approval and key material. Customers can achieve all the benefits of full centralised management, but would typically be configured for two-factor authentication.

  • CPA+

    Contains the same technical capabilities as CPA but single sign-on is disabled to meet criteria of certain security accreditations.

  • CAPS

    Available for the higher threat environments within UK government, military and NATO organisations where certification is necessary. These products are subject to export control and can only be purchased with prior sales approval and necessary key material from CESG. Published security procedures also provide appropriate guidance throughout the product life span. Security constraints, due to product architecture and operational procedures, means that some auditing and reporting capability is available, but not full central management.

Want to know more?

Let’s talk about Disk Encryption

Yes, please add me to your email listNo, please DO NOT add me to your email list