B.E. Prime Product Overview | Products

By: Beyond Encryption  05/12/2011
Keywords: Mobile Devices, Encryption, Data Security

For the small to medium business who would prefer B.E. to host and support their data security needs, B.E. have a secure hosted solution called B.E. Prime where we offer hosted solutions packages for organisations with anywhere from between one and one hundred laptops/PC’s.

The Beyond Encryption solution enables any organization to target, with pinpoint accuracy, its sensitive information on a device, regardless of location, and protect it. So the B.E. Prime solution is perfect for those smaller outfits who understand the importance and critical need to protect and secure their data and mobile devices without having to deploy the larger enterprise solution.

The technology behind the solution consists of four discrete components:

  • A server (B.E. Server) that maintains account information, policies, and settings associated with each individual device that has the B.E. Client deployed on it. The B.E. Server easily integrates with Active Directory.
  • A client agent (B.E. Client) that resides on each device under management, whose job it is to maintain contact with and carry out instructions issued from the B.E. Server. The B.E. Client cannot be removed from a device by the Device User.
  • A Secure Communications Channel (SCC) which provides a secure encrypted point-to-point communication channel between the B.E. Client and the B.E. Server.
  • A series of core security commands that the B.E. Server issues to the B.E. Client using the Secure Communications Channel for execution on the device.

The B.E. Server silently installs the B.E. Client on each of the devices under management. This is done without the need for any end user intervention. The Device user can’t prevent the solution being deployed and can’t prevent the security commands being actioned. Once the client is installed on the device it creates a heartbeat connection with the B.E. Server. This connection can be through LAN / WAN / Internet / GPRS.

When there is a direct connection between the B.E. Client and the B.E. Server the Administrator can perform any of the following actions:

  • Remote Data File Transfer – silently and securely transfer any file(s) from the device back to the B.E. Server
  • Remote Data Freeze – silently freezes any file(s) on the device by applying a layer of AES 256 bit encryption on the file(s)
  • Remote Data Erase – silently erase any file(s) on the device to DoD 5220.22-M Standard
  • Remote Device Lockdown – completely remove user access to the device and put the device into a lockdown loop.

The solution has complete audit functionality. Every action that the technology performs on a device and its data is logged and available for reporting and audit compliance. This is an imperative for compliance.

In addition to the direct action Reactive Security we’ve also built a Timed Security mode and a Geographic Security mode.

Keywords: Bit Encryption, Data File, Data Security, Encryption, Encryption Solution, File Transfer, Mobile Devices, Remote Data, Remote Device, secure communications, Secure Communications Channel,

Contact Beyond Encryption

Email - none provided

Print this page

Share

Other products and services from Beyond Encryption

05/12/2011

Beyond Enterprise Premium | Products

B.E. Premium is our companies bespoke product development and engineering service offering to larger clients who see the benefits of integrating the Beyond Encryption software into their own security applications as an additional layer or as the main core to their current products and projects.


05/12/2011

B.E. Professional Product Overview | Products

The Beyond Encryption solution enables any organization to target, with pinpoint accuracy, its sensitive information on a device, regardless of location, and protect it. A series of core security commands that the B.E. Server issues to the B.E. Client using the Secure Communications Channel for execution on the device.


05/12/2011

SME | Solutions

Beyond Encryption Technologies understands that a small to medium enterprise might not have the in-house technical resources to deploy their own enterprise solution, but still understands the vital need to have control of their companies end-point devices and the data residing therein.


05/12/2011

Financial Services | Solutions

Breach or leak of a financial institutions customer data base or certain private details of some or all of its customers there are uncomfortable questions to be answered and lots of repairing of the organisations good name and brand value. There are many legal obligations to protect customers' confidential personal details along with increasingly strict compliance requirements around safeguarding other pertinent confidential information.


05/12/2011

Health Care | Solutions

Also in Europe is Data Protection Directive officially Directive 95/46/EC which provides for the protection of individuals with regard to the processing of personal data and on the free movement of such data) is a European Union directive which regulates the processing of personal data within the European Union.


05/12/2011

Managed Service Operators | Solutions

Having a managed service solution to roll out to your subscibers for their PCs and latops as an extra revenue stream or even to increase the companies ARPU is a must in todays competitive world of communication service provisioning. B.E have various customised managed services solutions available to carriers to help their users to protect the data on their Laptops /PDA and other mobile computing devices.


05/12/2011

Government | Solutions

Local, state and federal government agencies around the world have moved rapidly into the electronic age, using technology to streamline internal processes and improve the delivery of services to their populations. B.E. endpoint data protection solutions use cryptographic technology that has been tested and approved against exacting standards such as FIPS 140-2 and Common Criteria.