baramundi Defense Control

baramundi Defense Control

Easy and Comprehensive Management of Windows Native BitLocker Encryption

Administrators work hard to hamper unauthorized access to their IT systems as much as possible. They achieve that with the right tools.
The administration and monitoring of the various functions of the Microsoft BitLocker encryption on computers in the network requires a lot of manual work and sneaker administration. This is where baramundi Defense Control (bDC) comes in.

Benefits for You

  • Transparent and reliable management of BitLocker encryption
  • Quick configuration thanks to individual profiles

Features

  • Inventory of Trusted Platform Modules (TPM) and BitLocker information
  • Control of BitLocker
  • Management of recovery keys
  • Granular permissions for sensitive BitLocker information
  • Assignment of initial unlock passwords

Supported platforms

baramundi Defense Control supports Windows 10 systems from version 1511.

Try it Out!

Find out whether baramundi Defense Control can help you, and request a free 30-day fully functional trial version. We’ll happily demonstrate to you in person in your company how you can make the most of working with baramundi Defense Control and how to make your IT infrastructure more robust through the right configuration.

baramundi Defense Control in detail

Transparent and reliable native security solution

baramundi Defense Control allows you to configure, enable and pause the encryption integrated in Windows 10. Using Windows‘ own solution ensures the greatest possible compatibility with all common applications. In addition, there is no need for additional security patches or updates as there would be with third-party products, as these are already integrated in regular Windows updates.

Simple BitLocker management

With baramundi Defense Control, comprehensive control of BitLocker settings is possible for all Windows endpoints in the company via a single interface. This enables you to see at a glance which systems are unprotected and which are encrypted. Recovery keys and unlock passwords can be centrally managed via key management. The bMS reserves separate access rights for authorized administrators to these sensitive keys.

Defense Control Disk Overview

Defense Control Disk Overview

Defense Control Configuration Profile

Defense Control Configuration Profile

Defense Control Bitlocker Secrets

Defense Control Bitlocker Secrets