The functionality for the BeyondEncryption Enterprise solution includes:
- Empowering the organisation to enforce device data security for devices. This can include desktop or mobile devices such as laptops, PDAs, etc.
- Allowing the organisation to aggressively pursue data on a device if either the device or the user has been compromised.
- Removing user access to any or all data files on a device.
- Remotely resetting a device so that all non-program files are completely and securely erased from the device. Especially useful when removing a device from active inventory in an organisation.
The product features include the ability to target specific files, folders and extensions on user devices for encryption/decryption, retrieval and/or destruction regardless of device location. But just as important is the ability to protect the data on the device by putting the device in a lock-down loop either remotely or through timed delay.
All this can be done in an environment to completely satisfy audit requirements. When a command has been remotely executed on a device the administrator receives a full report outlining when the command was sent to the device, when the command was executed on the device, and what files and folders were affected by what actions. Once the command has been sent from server and received by the device the user has no control to prevent the command execution on the remote device.