Protect data on your devices with centralized management\nEach year, millions of laptop computers are misplaced, stolen, or lost; many of them containing important and sensitive data. Full disk encryption is the essential first line of defense to protect your data in any of these events. Sophos Central gives you the ability to manage full disk encryption from a single, integrated, web-based management center. Securing data and staying compliant\nThe majority of mobile professionals carry laptops containing confidential company information. Passwords alone do not protect data. The best way to make sure your data is secure at rest is by encrypting the computer's hard drive. As a part of compliance requirements, you are likely to be able to verify which computers in your organization are encrypted. And in the case of lost or stolen laptops, organizations also need to provide proof that these missing devices are encrypted. Quick deployment\nSophos Central Device Encryption lets you centrally manage Windows BitLocker native device encryption. With Sophos Centrals web-based management, there is no server to deploy and no need to configure back-end key servers. You can deploy and start securing data in minutes. For existing Sophos Central Endpoint Protection customers, there is no additional agent required. Over-the-air deployment means that it takes only a couple of clicks to push out the new encryption policy. And, it lets you easily secure data on remote laptops. Unified management interface\nManage your encryption policy, encryption keys, as well as all your essential security policies using Sophos Central, a web-based integrated management console. Sophos Central provides an intuitive view for all your Sophos security products. Simple user-centric management\nSophos Central is centered around the user. When a user has more than one computer, you can enable device encryption and protect all of the user's computers with one easy action. Secure key recovery via our self-service portal\nSophos Central Self Service lets users retrieve their own full disk encryption recovery keys. This helps users get back to work faster without needing to contact the help desk, saving both time and IT resources.
Tutti i prezzi NON sono comprensivi di IVA.
Il Listino è in EURO, salvo se diversamente indicato. Marchi e i nomi di prodotti sono registrati dai rispettivi titolari. Dati a cura del Fornitore. Non possiamo essere ritenuti responsabili per eventuali errori o refusi presenti. Prodotti, versioni, prezzi, termini e garanzie sono soggetti a cambiamenti senza preavviso. In ogni rapporto di fornitura valgono le Condizioni Generali di Vendita. Prezzi aggiornati in tempo reale.