Before using DESlock+ for the first time, you will benefit from taking a few minutes to learn about categorising
data for protection and the methods of protecting your data with DESlock+ and the use of Encryption
Algorithms and Keys.
2.1 Categorising Data For Protection
Categorising your data protection requirements will help identify the features you use to securely protect your
information.
Data in Transit vs Data at Rest
Data in transit is information being shared from one user to another via a trusted (private) network or an
untrusted (public) network such as the internet and can be protected with some form of Granular Encryption.
Data at rest is the information stored on your hard drive, a backup drive or removable media when not in
use.
Granular Encryption
Granular Encryption refers to the protection of individual items like files, folders and emails.
File and email encryption enable users to share data and collaborate securely when data is in transit.
On your computer, folders on your hard drive or removable media can be encrypted. DESlock+ also provides
the ability to create encrypted Virtual Disks & Compressed Archives.
Files within encrypted folders and virtual disks can be transparently accessed when logged in to DESlock+.
If the your computers hard drive is removed or removable media is read from another system only the
encrypted data is protected.
Complete Security
For total peace of mind DESlock+ Full Disk Encryption (FDE) provides security for unintended and unexpected
events such as theft or loss of a computer, laptop or USB Flash Drive.
When used on your computer your entire hard drive is protected , including blank spaces while the system is
shut down. Windows cannot be started from this state without first entering pre-boot security.
If the drive is removed and read from another system all data remains encrypted.
DESlock+ Removable Media Encryption can also Full Disk Encrypt USB Flash drives.
2.2 DESlock+ and Encryption Keys
Encryption Keys
An Encryption Key is used with an encryption algorithm to determine the transformation of plaintext into
ciphertext and vice versa. This means that your files, text or disk drive sectors have been encrypted by an
algorithm are uniquely dependent on the encryption key used.
Shared Encryption Keys
In common with other encryption products, DESlock can use a shared password to share encrypted files,
archives, email Etc. However, these passwords cannot be backed up by an Administrator, are often forgotten
and frequently written down. Encrypting shared information with a Key is a far more manageable process,
less likely to be compromised and much less likely to result in a user being locked-out. Other systems do this
through the use of Public Key Cryptography or a version of this and while highly effective and easy for
competent technical users to work with, they may pose usability problems for non-technical users. DESlock+
approaches this problem from a different angle and allows users to have up to 64 different encryption keys
installed at the same time. These encryption keys may be shared with separate and overlapping user groups
and by doing the exact equivalent of what we all do with physical keys in our everyday lives DESlock+
provides a wholly intuitive means of allowing users to share encrypted information securely.
Manual
View the manual for the ESET DESlock+ Standard here, for free. This manual comes under the category antivirus software and has been rated by 1 people with an average of a 5.2. This manual is available in the following languages: English. Do you have a question about the ESET DESlock+ Standard or do you need help? Ask your question here
Need help?
Do you have a question about the ESET and is the answer not in the manual?
Question and answer
Number of questions: 0