The deployment, updating, and control of client software can be both time consuming and expensive tasks for companies and organizations. Things become exponentially more complicated the greater the number of workstations involved. Jetico Central Manager - included as a feature in Enterprise Editions of Jetico software - is used to remotely deploy Jetico software across all workstations, automatically update the software, monitor usage of encrypted containers and disk volumes, distribute security policies, and centrally manage the recovery information necessary to access encrypted data in case of an emergency.

Jetico client software provides a wide range of data protection solutions on remote workstations. Users can store selected files and folders in encrypted containers, encrypt entire disk partitions and dynamic disk volumes, as well as wipe selected files and folders (either manually or automatically).

Proper use of any security software requires the maintenance of a specified common policy for an entire company infrastructure. An IT Administrator is able to use Jetico Central Manager to create special security tasks in a centralized database and then automatically distribute them to remote computers. Additionally, Jetico Central Manager gathers rescue information from remote computers to further ensure safe usage of the client software. This guarantees that an Administrator has access to the appropriate rescue information in case of an emergency, such as when users forget their passwords.

Beyond simply task distribution and information gathering, Jetico Central Manager also allows an IT Admin to monitor the activity of users running the client software. The Jetico Central Manager Database collects log messages from client devices to report configuration changes as well as other security related events. Among other things, this allows the Administrator to create HTML- and PDF-formatted reports about the current state of the software on client computers.

Jetico Central Manager is a flexible and convenient tool for controlling client software on remote computers. Centrally managing a network of workstations immediately results in greater reliability and security - far superior to allowing a large organization of computers to independently run data protection software on their own.