Login Form






Lost Password?
No account yet? Register
Home arrow IT Security arrow Encryption device
Encryption device PDF Print E-mail

There are two parts to the implementation of Encryption:

  • The individual licence that is purchased per PC, Laptop or Desktop computer.
  • The time taken to install the software.

There are two parts to the implementation of Encryption:

  • The individual licence that is purchased per PC, Laptop or Desktop computer.
  • The time taken to install the software.

Part One

prism recommends Utimaco Safeguard Easy encryption software. We have successfully employed this market-leading product in hundreds of clients’ machines. Features of the software include:

  • Market leading product prism always adopts the best products and services because that is what our clients expect from us.
  • Non-intrusive application. Unlike some other applications on the market, this product does not constantly annoy you with messages and pop-ups. After you log on, it is virtually invisible.
  • Moveable licence. Once you have purchased it you are able to move the licence to any replacement machine in the future.

Part Two

prism use only their own engineers to conduct installations of products and service. This is so that we can guarantee quality performance and standardisation of installation.
The security implementation consists of the following:

  • Take image of PC.Using market-leading software, our technicians will take a copy or image of the pc onto their hard drive. This is in case of any complications or failures during the installation and will take approximately 30 minutes per machine.
  • Install Encryption Software. Once the image has been taken the installation of software begins. This will run for between two and three hours depending on the size of the hard drive and the amount of data stored
  • Implementation Procedure.Once the installation begins the PC will not be usable until the process has finished. Since this can take up to four hours it is important to be prepared for the downtime and ensure staff members have other activities to undertake. Because of the time involved in the process we are only able to encrypt a maximum of six machines per day.
 
< Prev   Next >