Easy and Comprehensive Management of Windows Native BitLocker Encryption
Administrators work hard to hamper unauthorized access to their IT systems as much as possible. They achieve that with the right tools.
The administration and monitoring of the various functions of the Microsoft BitLocker encryption on computers in the network requires a lot of manual work and sneaker administration. This is where baramundi Defense Control (bDC) comes in.
Benefits for You
- Transparent and reliable management of BitLocker encryption
- Quick configuration thanks to individual profiles
Features
- Inventory of Trusted Platform Modules (TPM) and BitLocker information
- Control of BitLocker
- Management of recovery keys
- Granular permissions for sensitive BitLocker information
- Assignment of initial unlock passwords
Supported platforms
baramundi Defense Control supports Windows 10 systems from version 1511.
Try it Out!
Find out whether baramundi Defense Control can help you, and request a free 30-day fully functional trial version. We’ll happily demonstrate to you in person in your company how you can make the most of working with baramundi Defense Control and how to make your IT infrastructure more robust through the right configuration.
Get in touch!
baramundi Defense Control in detail
Transparent and reliable native security solution
baramundi Defense Control allows you to configure, enable and pause the encryption integrated in Windows 10. Using Windows‘ own solution ensures the greatest possible compatibility with all common applications. In addition, there is no need for additional security patches or updates as there would be with third-party products, as these are already integrated in regular Windows updates.
Simple BitLocker management
With baramundi Defense Control, comprehensive control of BitLocker settings is possible for all Windows endpoints in the company via a single interface. This enables you to see at a glance which systems are unprotected and which are encrypted. Recovery keys and unlock passwords can be centrally managed via key management. The bMS reserves separate access rights for authorized administrators to these sensitive keys.