baramundi Defense Control
Administrators endeavor to make it as difficult as possible for unauthorized persons to access their IT infrastructure systems. And they do so with the right tools.
Windows Defender has improved significantly over the years: In the beginning it was more of a kind of added bonus, but now it is a sophisticated full package for securing computers running Windows 10.
However, managing and monitoring its various functions on the computers in the network requires a lot of manual work and running from place to place. This is where baramundi Defense Control (bDC) comes in.
- Transparent and reliable management of BitLocker encryption
- Quick configuration thanks to individual profiles
- Manage Windows10 Defender security settings from a single interface
- Inventory of Trusted Platform Modules (TPM) and BitLocker information
- Control of BitLocker
- Management of recovery keys
- Granular permissions for sensitive BitLocker information
- Assignment of initial unlock passwords
baramundi Defense Control supports Windows 10 systems from version 1511.
Find out whether baramundi Defense Control can help you, and request a free 30-day fully functional trial version. We’ll happily demonstrate to you in person in your company how you can make the most of working with baramundi Defense Control and how to make your IT infrastructure more robust through the right configuration.
Benefit: Transparent and reliable native security solution
baramundi Defense Control allows you to configure, enable and pause the encryption integrated in Windows 10. Using Windows' own solution ensures the greatest possible compatibility with all common applications. In addition, there is no need for additional security patches or updates as there would be with third-party products, as these are already installed alongside regular Windows updates.
Simple BitLocker management
With baramundi Defense Control, BitLocker can be comprehensively controlled throughout the entire company from a single interface. At a glance, you can see which systems are currently unprotected and which are encrypted. Recovery keys and unlock passwords can be managed centrally via the key management feature. bMS provides a separate permission for this sensitive data, so that only authorized administrators have access to keys.