SlideShare a Scribd company logo
As the name implies
this innovative tool is designed to be easy enough for an
IT staff of one to deploy & manage and to be transparent
enough to users to ensure maximum employee productiv-
ity. SimplySecureTM
dispels the reputation earned by other
products in this category.
SimplySecureTM
is the only web-managed endpoint
security system that can enforce encryption and security
policy- including wiping at-risk data - on Windows & Mac
PCs, iPhones & iPads, Android mobility devices and USB
Flash devices from one unified administration console.
Quick deployment, easy management.
Because Beachhead subscriptions are enabled through the
cloud, there is no hardware or software infrastructure to
purchase, install or support. Internet access provides secure
web-based access to your management console no matter
where you are. Deployment is fast, updates are easy and
adding licenses at any time is handled with just a phone call.
A light-touch, holistic approach.
Whenever possible, the SimplySecureTM
system leverages
resident OS tools. And why not? Managing on-board tools
provides an inherent level of compatibility and maximum
efficiency – Microsoft, Apple and Google make sure of
it! These tools are organisationally managed and user-
transparent. No training, no burden, no negative impact.
Encryption Is just the beginning.
Encryption is required to ensure compliance to a growing list
of government and industry mandates. But encryption alone
cannot protect your data if the password is compromised or
if the device is already authenticated. Beachhead offers the
only endpoint security tools that not only encrypt data but
also protect it when encryption by itself can’t. Beachhead’s
subscriptions give the you the patented ability to deny and
restore access to data remotely (“data quarantine”), destroy
at-risk data or to perform a number of other remote protec-
tions to ensure your data is safe from compromise.
As if it weren’t already easy enough.
For those who have neither the in-house resources, expertise
or the time, SimplySecureTM
can be purchased monthly as a
managed service. SimplySecureTM
MANAGED is available
through Beachhead-authorized MSPs. Compliance and data
protection for your mobile devices couldn’t be easier!
© 2015 Beachhead Solutions Inc. All rights reserved. Beachhead Solutions and the design are
trademarks of Beachhead Solutions Inc. All other trademarks and registered trademarks are the
property of their respective owners. SSM 4 SA11.14
Introducing Beachhead’s
SimplySecureTM
Management System
Easy, unified, web-managed mobile device security.
Beachhead’s SimplySecureTM
Management System is a single, configurable,
web-based console with device modules that can be added in any mix
or quantity for iPhone & iPads, Android devices, Windows & Mac
PCs and USB storage devices. This unique system allows you to
remotely secure the vulnerable devices in your organisation -
including those owned by employees.
PCs & Laptops
Tablets / Pads
Phones
Macs
USB Drives
All things mobile. TM
SimplySecure
SimplySecure PCs & Macs
Still the heart and soul of user productivity, there’s more data here for thieves than any other mobile device.
Plus, industry, national, state and local regulations require encryption – and sometimes elimination – of all
at risk consumer data. Still, many businesses fail to comply, leaving customers and employees vulnerable to
identity theft, opening the possibility for lawsuits, and allowing sensitive corporate information to escape.
Why don’t they simply put encryption in place? Many reasons: user productivity is often impaired with tradi-
tional encryption software on PCs, implementation can be difficult and often requires purchase of additional
software and hardware, and recovery from unintended data access elimination can be arduous (or impos-
sible). And to make matters even more complicated, it is usually impossible to manage PCs from the same
console as Macs, phones and tablets.
None of that is true of SimplySecure PC. Managed from the same console as other mobile devices, Simply-
Secure PC layers an intelligent engine on top of encryption built into the operating systems of all PCs, so the
user burdens are wiped away. Plus, Beachhead’s tool can instantly remove user access to data, and uses a
patented method to immediately restore the data by pushing one button on the SimplySecure Management
Console. Pretty neat trick, huh?
Great, but what about Macs you ask? Fear not – Beachhead’s SimplySecure Mac handles this need smoothly.
Features include:
Immediate data access elimination through patented “quarantine” – reset passwords, persistent
shutdown, and elimination of local encryption key (PC only). Instant remote restoration of data
access with administrator approval
Complete data wipe capability when devices are stolen
Broad range of both administrator-enabled and automatic security responses to threat conditions
Remote enforcement of password and security policy
Customizable reporting of status and device risks/conditions
Enforced encryption of all sensitive data on the PC or Mac
All things mobile. TM
SimplySecure
SimplySecure Phones & Tablets
Smartphones have become the single most carried, most valuable life tool for many people. Often owned
by employees, they are personalized, yet have unlimited access to wads of sensitive data. What happens to
that data if the phone is lost or stolen? Is the employee a good corporate citizen who password protected the
phone, saved no sensitive materials, and encrypted everything else? Maybe? Who are we kidding? No, we
cannot assume ideal phone security.
And what about iPads and Android tablets? They are nearly as portable as phones, but can carry and display
data like PCs. Wow, a perfect storm of security risk! And the more tablets get used instead of PCs, the great-
er the data holdings and the greater the risks.
SimplySecure Phones & Tablets to the rescue! Encryption, application management, password enforcement,
device tracking and data elimination are some of the capabilities that are at your disposal, accessed via the
same, single, easy to operate policy management console that can be used to manage all your phones, PCs
and other devices.
Features include:
Remote network access shutoff
Immediate data access elimination through instant lock (All platforms), password reset and per-
sistent shutdown (Android only)
Complete data wipe capability when devices are stolen
Remote enforcement of password and security policy
Customizable reporting of status and device risks/conditions
Broad range of both administrator-enabled and automatic security responses to threat conditions
Enforced encryption of all sensitive data on the phone or tablet
All things mobile. TM
SimplySecure
SimplySecure USB Storage
Talk about a BYOD invasion, how about R100 flash drives?! Four times as much data as some iPads, fits in a
shirt pocket, and is smaller than your thumb. Sounds like a security problem! Often unintentional, but these
tiny storage devices are so very portable that they can go – and be lost – anywhere. Thieves are not both-
ered by form factors – the data is the same. Fortunately, SimplySecure USB Storage is here to rescue you
from this nightmare. Your company doesn’t have to issue expensive, specialty secure flash drives. SimplySe-
cure USB Storage can be applied to any flash drive, from any manufacturer, even after it has been initialized
by the user. Data is compartmentalized, so family reunion photos can safely and happily coexist on the same
drive as your encrypted company financials. It can also be set up to only allow reading of the drive by certain
employees, or in certain circumstances (e.g., with an Internet connection), across a defined grouping of PCs.
Features include:
Bifurcation of drive allows for separate personal and business usage – only business side under
corporate security/encryption control
Enforced encryption of all sensitive data on the drive
Configurable to include requirement for remote authentication (cloud) to open any file, limita-
tions on which computers can be used to open files, instant data lock and wipe capability when
devices are stolen
Broad range of both administrator-enabled and automatic security responses to threat conditions
Remote enforcement of password and security policy
Customizable reporting of status and device risks/conditions
All things mobile. TM
SimplySecure
This little device
may be your
biggest data
loss vulnerability

More Related Content

What's hot

Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White PaperSybase Türkiye
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Kenneth de Brucq
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Summit 7 Systems
 
Covert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationCovert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementation
Larry Covert
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
Hexnode
 
Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)
SPEC INDIA
 
Generic_Brochure_gray
Generic_Brochure_grayGeneric_Brochure_gray
Generic_Brochure_grayDan Itkis
 
Why Hexnode UEM
Why Hexnode UEMWhy Hexnode UEM
Why Hexnode UEM
Hexnode
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)
Amr Salah
 
jentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finaljentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finalBen Ohana
 
Fusion - Cloud Security, Management and Support
Fusion - Cloud Security, Management and SupportFusion - Cloud Security, Management and Support
Fusion - Cloud Security, Management and Support
Panda Security
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
Canon Business CEE
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-security
CincoC
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
Sunray Presentation
Sunray PresentationSunray Presentation
Sunray Presentation
Emirates Computers
 
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
DWP Information Architects Inc.
 
Empower your business with TeamViewer 13
Empower your business with TeamViewer 13Empower your business with TeamViewer 13
Empower your business with TeamViewer 13
Logicom Distribution
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop Virtualization
Jose Bittencourt
 

What's hot (20)

Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White Paper
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
 
Covert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationCovert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementation
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 
Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)
 
Generic_Brochure_gray
Generic_Brochure_grayGeneric_Brochure_gray
Generic_Brochure_gray
 
Why Hexnode UEM
Why Hexnode UEMWhy Hexnode UEM
Why Hexnode UEM
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)
 
jentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finaljentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-final
 
Fusion - Cloud Security, Management and Support
Fusion - Cloud Security, Management and SupportFusion - Cloud Security, Management and Support
Fusion - Cloud Security, Management and Support
 
IP-guard Catalog
IP-guard CatalogIP-guard Catalog
IP-guard Catalog
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-security
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Sunray Presentation
Sunray PresentationSunray Presentation
Sunray Presentation
 
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
 
Empower your business with TeamViewer 13
Empower your business with TeamViewer 13Empower your business with TeamViewer 13
Empower your business with TeamViewer 13
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop Virtualization
 

Similar to BH SA A4 Brochure

Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
Juan Ignacio Oller Aznar
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
Icomm Technologies
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
hassan latifi
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
Hexnode
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
Jesica Trejo
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
WorksPad
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
The TNS Group
 
Are Your Endpoints Protected?
Are Your Endpoints Protected?Are Your Endpoints Protected?
Are Your Endpoints Protected?
The TNS Group
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
GeekTek IT Services
 
Laptop management
Laptop managementLaptop management
Laptop management
Killian Delaney
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
original.pdf
original.pdforiginal.pdf
original.pdf
Cade Soluciones
 
potencializa tu trabajo
potencializa tu trabajopotencializa tu trabajo
potencializa tu trabajo
Cade Soluciones
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6
Bartosz Bredy
 
4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdf4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdf
Host It Smart
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Moses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On SmartphonesMoses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On Smartphones
Papitha Velumani
 

Similar to BH SA A4 Brochure (20)

Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
Are Your Endpoints Protected?
Are Your Endpoints Protected?Are Your Endpoints Protected?
Are Your Endpoints Protected?
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Laptop management
Laptop managementLaptop management
Laptop management
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
potencializa tu trabajo
potencializa tu trabajopotencializa tu trabajo
potencializa tu trabajo
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6
 
4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdf4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdf
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Moses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On SmartphonesMoses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On Smartphones
 

BH SA A4 Brochure

  • 1. As the name implies this innovative tool is designed to be easy enough for an IT staff of one to deploy & manage and to be transparent enough to users to ensure maximum employee productiv- ity. SimplySecureTM dispels the reputation earned by other products in this category. SimplySecureTM is the only web-managed endpoint security system that can enforce encryption and security policy- including wiping at-risk data - on Windows & Mac PCs, iPhones & iPads, Android mobility devices and USB Flash devices from one unified administration console. Quick deployment, easy management. Because Beachhead subscriptions are enabled through the cloud, there is no hardware or software infrastructure to purchase, install or support. Internet access provides secure web-based access to your management console no matter where you are. Deployment is fast, updates are easy and adding licenses at any time is handled with just a phone call. A light-touch, holistic approach. Whenever possible, the SimplySecureTM system leverages resident OS tools. And why not? Managing on-board tools provides an inherent level of compatibility and maximum efficiency – Microsoft, Apple and Google make sure of it! These tools are organisationally managed and user- transparent. No training, no burden, no negative impact. Encryption Is just the beginning. Encryption is required to ensure compliance to a growing list of government and industry mandates. But encryption alone cannot protect your data if the password is compromised or if the device is already authenticated. Beachhead offers the only endpoint security tools that not only encrypt data but also protect it when encryption by itself can’t. Beachhead’s subscriptions give the you the patented ability to deny and restore access to data remotely (“data quarantine”), destroy at-risk data or to perform a number of other remote protec- tions to ensure your data is safe from compromise. As if it weren’t already easy enough. For those who have neither the in-house resources, expertise or the time, SimplySecureTM can be purchased monthly as a managed service. SimplySecureTM MANAGED is available through Beachhead-authorized MSPs. Compliance and data protection for your mobile devices couldn’t be easier! © 2015 Beachhead Solutions Inc. All rights reserved. Beachhead Solutions and the design are trademarks of Beachhead Solutions Inc. All other trademarks and registered trademarks are the property of their respective owners. SSM 4 SA11.14 Introducing Beachhead’s SimplySecureTM Management System Easy, unified, web-managed mobile device security. Beachhead’s SimplySecureTM Management System is a single, configurable, web-based console with device modules that can be added in any mix or quantity for iPhone & iPads, Android devices, Windows & Mac PCs and USB storage devices. This unique system allows you to remotely secure the vulnerable devices in your organisation - including those owned by employees. PCs & Laptops Tablets / Pads Phones Macs USB Drives All things mobile. TM SimplySecure
  • 2. SimplySecure PCs & Macs Still the heart and soul of user productivity, there’s more data here for thieves than any other mobile device. Plus, industry, national, state and local regulations require encryption – and sometimes elimination – of all at risk consumer data. Still, many businesses fail to comply, leaving customers and employees vulnerable to identity theft, opening the possibility for lawsuits, and allowing sensitive corporate information to escape. Why don’t they simply put encryption in place? Many reasons: user productivity is often impaired with tradi- tional encryption software on PCs, implementation can be difficult and often requires purchase of additional software and hardware, and recovery from unintended data access elimination can be arduous (or impos- sible). And to make matters even more complicated, it is usually impossible to manage PCs from the same console as Macs, phones and tablets. None of that is true of SimplySecure PC. Managed from the same console as other mobile devices, Simply- Secure PC layers an intelligent engine on top of encryption built into the operating systems of all PCs, so the user burdens are wiped away. Plus, Beachhead’s tool can instantly remove user access to data, and uses a patented method to immediately restore the data by pushing one button on the SimplySecure Management Console. Pretty neat trick, huh? Great, but what about Macs you ask? Fear not – Beachhead’s SimplySecure Mac handles this need smoothly. Features include: Immediate data access elimination through patented “quarantine” – reset passwords, persistent shutdown, and elimination of local encryption key (PC only). Instant remote restoration of data access with administrator approval Complete data wipe capability when devices are stolen Broad range of both administrator-enabled and automatic security responses to threat conditions Remote enforcement of password and security policy Customizable reporting of status and device risks/conditions Enforced encryption of all sensitive data on the PC or Mac All things mobile. TM SimplySecure
  • 3. SimplySecure Phones & Tablets Smartphones have become the single most carried, most valuable life tool for many people. Often owned by employees, they are personalized, yet have unlimited access to wads of sensitive data. What happens to that data if the phone is lost or stolen? Is the employee a good corporate citizen who password protected the phone, saved no sensitive materials, and encrypted everything else? Maybe? Who are we kidding? No, we cannot assume ideal phone security. And what about iPads and Android tablets? They are nearly as portable as phones, but can carry and display data like PCs. Wow, a perfect storm of security risk! And the more tablets get used instead of PCs, the great- er the data holdings and the greater the risks. SimplySecure Phones & Tablets to the rescue! Encryption, application management, password enforcement, device tracking and data elimination are some of the capabilities that are at your disposal, accessed via the same, single, easy to operate policy management console that can be used to manage all your phones, PCs and other devices. Features include: Remote network access shutoff Immediate data access elimination through instant lock (All platforms), password reset and per- sistent shutdown (Android only) Complete data wipe capability when devices are stolen Remote enforcement of password and security policy Customizable reporting of status and device risks/conditions Broad range of both administrator-enabled and automatic security responses to threat conditions Enforced encryption of all sensitive data on the phone or tablet All things mobile. TM SimplySecure
  • 4. SimplySecure USB Storage Talk about a BYOD invasion, how about R100 flash drives?! Four times as much data as some iPads, fits in a shirt pocket, and is smaller than your thumb. Sounds like a security problem! Often unintentional, but these tiny storage devices are so very portable that they can go – and be lost – anywhere. Thieves are not both- ered by form factors – the data is the same. Fortunately, SimplySecure USB Storage is here to rescue you from this nightmare. Your company doesn’t have to issue expensive, specialty secure flash drives. SimplySe- cure USB Storage can be applied to any flash drive, from any manufacturer, even after it has been initialized by the user. Data is compartmentalized, so family reunion photos can safely and happily coexist on the same drive as your encrypted company financials. It can also be set up to only allow reading of the drive by certain employees, or in certain circumstances (e.g., with an Internet connection), across a defined grouping of PCs. Features include: Bifurcation of drive allows for separate personal and business usage – only business side under corporate security/encryption control Enforced encryption of all sensitive data on the drive Configurable to include requirement for remote authentication (cloud) to open any file, limita- tions on which computers can be used to open files, instant data lock and wipe capability when devices are stolen Broad range of both administrator-enabled and automatic security responses to threat conditions Remote enforcement of password and security policy Customizable reporting of status and device risks/conditions All things mobile. TM SimplySecure This little device may be your biggest data loss vulnerability