Managed Full-Disk Encryption Services
CSC’s Managed Encryption Services (MES) provides you with full-disk encryption including access control — so lost or stolen equipment doesn’t lead to lost or stolen data — thereby putting your business at risk.
Today’s organizations handle more data than ever before. Everything from company planning information to financials and even intellectual property is stored and managed by employees around the world. Information about customers, products and services is being used, stored and shared every day from PCs, removable disks and even cell phones. Left unprotected, just one of these devices, if lost or stolen, may make your company vulnerable to unnecessary risk.
Protection Made Easy
CSC’s Managed Encryption Service (MES) provides you with full-disk encryption — so lost or stolen equipment doesn’t lead to lost or stolen data — thereby putting your business at risk. MES includes access control that lets users in, while keeping the bad guys out. By using MES, the entire system of a laptop, desktop, external drive, USB flash drive, system files and/or swap files are encrypted.
Service Components:
- Installation of full-disk encryption software and hardware required to support desktop encryption
- Fully managed 24x7x365 operations and support
- A central repository for key escrowing, volume recovery information, profiles, audit logs, reporting and software deployment will be available around the clock through CSC’s Security Operation Center
- Profile administration — adding or deleting users, updating policies or assigning new privileges
- Adjusting policies to comply with security requirements as defined by company,local or state laws and policies
- Software upgrades — deploying software update profiles as new versions become available
- Key recovery administration — maintaining the online automated help system
- Automated backup and archiving of stored keys and remote profiles
Benefits of CSC's full-disk encryption software and services
Our comprehensive approach adds value to your business not only by reducing risk and the potential attendant cost of a security breach and intellectual capital, but also by enabling improved efficiencies and productivity for the mobile workforce. Benefits to your business include:
- Access to a proven solution and expert resources to help protect your business, without overburdening or increasing your own staff
- Full automation and centralized management — removing the end user from the encryption process
- Intellectual property and data stays with the enterprise through multiple options for recovery and key escrow
- Reduce financial impact and complexity of compliance efforts through the enforcement and management of end-point encryption
- Efficient full-disk encryption process doesn’t strap resources or slow down end-point systems
