Protege tus datos:

Deslock es una aplicación de cifrado de datos, destinada para pequeñas y grandes empresas. La encriptación de datos proporciona la seguridad a la información y comunicación en la empresa. , administrando los usuarios o estaciones de trabajo de forma remota, incluyendo el uso compartido de claves. Deslock encripta los discos completos, extraíbles, archivos, carpetas y correo electrónicos.

Beneficios del Cifrado:
  • Proteger la información confidencial de una organización
  • Proteger el flujo de mails de la empresa
  • Proteger las comunicaciones de una organización
  • Proteger dispositivos móviles e inalámbricos
  • Proteger la imagen y el prestigio de una organización



DESlock+ Enterprise Server

Managing encryption beyond the corporate network

Deploying and managing endpoint encryption is one of the more challenging tasks for an IT department. With today's mobile workforce, home working on the rise and increasing numbers of users who spend all or most of their time away from the corporate network, central management of encryption keys and security policy needs a fresh approach.
Like a few other systems, The DESlock+ Enterprise Server can manage users via the internet. However, unlike other systems these users and their workstations do not need to have Active Directory or Domain accounts. More importantly no incoming connection is required for client PC's or the Enterprise server, avoiding the cost and headache of configuring and managing a secure incoming port. The Management console is web based, allowing multi-user administration across the network, and a help-desk login provides non-admin access to user-recovery features.
No other management tool is deployed as easily or can provide a comparable degree of control. The DESlock+ Enterprise Server does more for less, making DESlock+ the most cost effective endpoint data encryption solution in every way.
For more information, or to arrange a pilot demonstration please Contact us here »

Key Features

  • No incoming server connection needed
  • Independent of network accounts
  • Manage any PC via the internet
  • Manage users and workstations
  • Control encryption security policy
  • Remotely manage encryption keys
  • Wipe keys and remove FDE users
  • Manage full-disk encryption
  • Manage removable media encryption
  • Force password changes
  • Remotely reset passwords
  • Remote user recovery


Detailed overview Download Data Sheet System Requirements