B.E. Professional Product Overview | Products

By: Beyond Encryption  05/12/2011
Keywords: Mobile Devices, Encryption, Bit Encryption

B.E. Professional security product  is an enterprise solution for larger corporations who would prefer to have their B.E. Server hosted in-house.

The Administrators within the larger organizations would roll the B.E. Client out the company’s network to all relevant devices.

The Beyond Encryption solution enables any organization to target, with pinpoint accuracy, its sensitive information on a device, regardless of location, and protect it. So the B.E. Prime solution is perfect for those smaller outfits who understand the importance and critical need to protect and secure their data and mobile devices without having to deploy the larger enterprise solution.

The technology behind the solution consists of four discrete components:

  • A server (B.E. Server) that maintains account information, policies, and settings associated with each individual device that has the B.E. Client deployed on it. The B.E. Server integrates with Active Directory and can maintain a live connection with same.
  • A client agent (B.E. Client) that resides on each device under management, whose job it is to maintain contact with and carry out instructions issued from the B.E. Server. The B.E. Client cannot be removed from a device by the Device User.
  • A Secure Communications Channel (SCC) which provides a secure encrypted point-to-point communication channel between the B.E. Client and the B.E. Server.
  • A series of core security commands that the B.E. Server issues to the B.E. Client using the Secure Communications Channel for execution on the device.

The B.E. Server silently installs the B.E. Client on each of the devices under management. This is done without the need for any end user intervention. The Device user can’t prevent the solution being deployed and can’t prevent the security commands being actioned. Once the client is installed on the device it creates a heartbeat connection with the B.E. Server. This connection can be through LAN / WAN / Internet / GPRS.

When there is a direct connection between the B.E. Client and the B.E. Server the Administrator can perform any of the following actions:

  • Remote Data File Transfer – silently and securely transfer any file(s) from the device back to the B.E Server
  • Remote Data Freeze – silently freezes any file(s) on the device by applying a layer of AES 256 bit encryption on the file(s)
  • Remote Data Erase – silently erase any file(s) on the device to DoD 5220.22-M Standard
  • Remote Device Lockdown – completely remove user access to the device and put the device into a lockdown loop.

The solution has complete audit functionality. Every action that the technology performs on a device and its data is logged and available for reporting and audit compliance. This is an imperative for compliance.

In addition to the direct action Reactive Security we’ve also built a Timed Security mode and a Geographic Security mode.

Keywords: Bit Encryption, Data File, Encryption, Encryption Solution, File Transfer, Mobile Devices, Remote Data, Remote Device, secure communications, Secure Communications Channel,

Contact Beyond Encryption

Email - none provided

Print this page


Other products and services from Beyond Encryption


B.E. Prime Product Overview | Products

For the small to medium business who would prefer B.E. to host and support their data security needs, B.E. have a secure hosted solution called B.E. Prime where we offer hosted solutions packages for organisations with anywhere from between one and one hundred laptops/PC’s.


Beyond Enterprise Premium | Products

B.E. Premium is our companies bespoke product development and engineering service offering to larger clients who see the benefits of integrating the Beyond Encryption software into their own security applications as an additional layer or as the main core to their current products and projects.


SME | Solutions

Beyond Encryption Technologies understands that a small to medium enterprise might not have the in-house technical resources to deploy their own enterprise solution, but still understands the vital need to have control of their companies end-point devices and the data residing therein.


Financial Services | Solutions

Breach or leak of a financial institutions customer data base or certain private details of some or all of its customers there are uncomfortable questions to be answered and lots of repairing of the organisations good name and brand value. There are many legal obligations to protect customers' confidential personal details along with increasingly strict compliance requirements around safeguarding other pertinent confidential information.


Health Care | Solutions

Also in Europe is Data Protection Directive officially Directive 95/46/EC which provides for the protection of individuals with regard to the processing of personal data and on the free movement of such data) is a European Union directive which regulates the processing of personal data within the European Union.


Managed Service Operators | Solutions

Having a managed service solution to roll out to your subscibers for their PCs and latops as an extra revenue stream or even to increase the companies ARPU is a must in todays competitive world of communication service provisioning. B.E have various customised managed services solutions available to carriers to help their users to protect the data on their Laptops /PDA and other mobile computing devices.


Government | Solutions

Local, state and federal government agencies around the world have moved rapidly into the electronic age, using technology to streamline internal processes and improve the delivery of services to their populations. B.E. endpoint data protection solutions use cryptographic technology that has been tested and approved against exacting standards such as FIPS 140-2 and Common Criteria.