View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
August 6, 2009

Mac end points get full disk encryption protection

Credant extends reach of endpoint threat minimiser

By CBR Staff Writer

Credant Technologies the supplier of endpoint data protection systems has increased the reach of its mobile data encryption technology to address the increasing number of Apple machines finding a way into the enterprise. 

In its latest guise the Mobile Guardian Enterprise Edition can be used to secure any Mac OS X platform, and also enables iPhone users to synchronise with their exchange servers securely.

Version 6.5 adds full disk encryption and protection capabilities to the enterprise threat defence system, and is said to provide some key data protection enhancements for compliance reporting.

The software ensures “encryption of all data on physical and logical Mac drives, including multi-partition configurations,” the company said.

Credant mostly develops software for tackling the stolen and lost laptop problem, an increasingly common issue and which now falls under regulations that compel companies to disclose when sensitive customer data is compromised.

Its software is used to enforce encryption policies on removable storage media, such as USB pens and iPods, and which can be used alongside other endpoint security mechanisms such as RSA’s SecurID two-factor authentication tokens.

Administrators can also use a ‘remote kill’ option in Mobile Guardian to set a policy to wipe data from a device if and when it is stolen. It can be sent down as a policy over the network, or as a set of preset rules.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Credant specialises in endpoint data leakage prevention, and as well as the enterprise product line, sells its Protector suite to government and public sector agencies. 

That provides high levels of protection for sensitive government data and enables employees to continue using removable media, such as USB drives, while reducing the risk of that data being lost, stolen, or corrupted. It also prevents malicious code attacks, as well as enabling control of data ports on US Department of Defense (DoD) and civilian networks.



Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.