DESlock+ Mobile

DESlock+ Mobile compliments the full Windows® product by providing the means to read, reply to and create encrypted email messages and attachments. Encryption keys and related policy settings for iOS devices are remotely managed alongside your laptop and desktop computer deployments of DESlock+.

Benefits

Fast strong encryption

DESlock+ employs industry standard encryption algorithms to provide fast, strong security with minimal user interaction.

Fully scalable central management

The DESlock+ Enterprise Server is designed to centrally manage remote devices. With no dependency on any existing server architecture installation and setup is quick and efficient. Secure https: connectivity allows control of policy and encryption keys beyond your existing security boundary and across networks.

Manage devices anywhere

The DESlock+ Enterprise Server manages keys and security policy via corporate LAN or through the cloud. Home and mobile working make extending encryption security policy beyond the perimeter of your network, a necessity; DESlock+ makes it a reality.

Advantages

Patented remote central management system

The DESlock+ Enterprise Server is designed to centrally manage remote users and workstations. With no dependency on any existing directory or server architecture, installation and setup is quick and efficient. Secure, all-outgoing connectivity allows control of users, workstations & devices, policy and encryption keys beyond your existing security boundary, through the cloud and across networks.

Patented key-sharing technology for transparent, secure collaboration

Most encryption products are designed to intimidate the competition and impress security experts. DESlock+ is designed with the enduser in mind. Our patented key-sharing technology is intuitive, easy to use and empowers non-technical users through it's jargon-free interface.

Features

  • Email encryption
  • Text encryption
  • Encrypted attachments
  • Remote, central administration
  • Compatible with Windows® product
  • FIPS 140-2 level 1 validated
  • Per-user licencing
  • Certifications

    FIPS 140-2 level 1

  • Algorithms & standards

    AES 128-bit
    SHA 256-bit
    RSA 1024-bit
    Triple DES 112-bit
    Blowfish 128-bit
  • System requirements

    Operating System:
    iOS® 7.0 and above
    Devices:
    iPhone
    iPad & iPad mini
    iPod
SC Magazine

SC Magazine: “This is an attractive product that does what it promises without fuss”
Network Computing
Network Computing: “When you have data security solutions this simple to implement and use, companies really have no excuse for failing to comply with regulations”