1. Web-based Jetico Central Management Console.
    After initial server setup and configuration, the Management Console can be accessed from any device including tower PCs, tablets and smartphones, whether it is Mac, Windows or Android. New UI reflects the status of client endpoints and the progress of applied tasks in real time. New design allows getting info about selected computer, group of computers or even entire companies with just one glance. Redesigned icons outline computers that are policy compliant or have problems reported.
  2. Centralized deployment.
    Automatically add computers to database by running one executable file. Compatible with deployment automation solutions like Microsoft SCCM, LANDesk, etc.
  3. Central management of BestCrypt Volume Encryption
    Manage encryption on client computers remotely by combining a variety of encryption settings into one Encryption Policy. Create and save encryption policies for easier distribution of custom encryption settings or use a number of preconfigured policies offered by Jetico. Assign policies to computer groups or selected computers.
  4. Central Management of BCWipe
    Control wiping on client computers remotely by combining a variety of wiping tasks into one Wiping Policy. Create and save wiping policies for easier distribution of custom wiping settings or use a number of pre-configured policies offered by Jetico. Assign policies to computer groups or selected computers.
  5. Encrypted Client-Server communication over HTTPS.
    Client-Server communication is secured with public key encryption and happens over HTTPS channel.
  6. Human-friendly names in Management Console.
    The new version allows setting a human-friendly Display Name to be used as alternative to default host names in Jetico Central Manager console.
  7. Multiple accounts with different level of access.
    Share responsibilities between multiple accounts. Assign predefined user roles: Administrator, Operator or Auditor and chose which company to grant access to.
  8. Enforcing users to update their passwords.
    For even better security and added protection against brute-force attacks, encryption administrators can now require end users to change encryption passwords after 3, 6 or 12 months.
  9. Enforcing strong passwords to access JCM web console.
    JCM administrator can now choose to only allow JCM web console passwords that meet special requirements.
  10. Audit logs.
    Trace back important changes made to the configuration with explicit activity reporting for all accounts or a selected one within a specified period of time. A periodic review of system-generated logs can detect security problems, including attempts to exceed access authority or gain system access during unusual hours.
  11. Enhanced reporting.
    Select a company and generate a report featuring information about active accounts, licenses, managed computers and their current state in just one click. Optionally, an account activity log can be included in this report. HTML and PDF formats are supported.
  12. Enhanced logging.
    Browse for the log of selected computer or group of computers to see the full list of changes made or use the filter to view only Warnings or Errors reported. Additionally, it is possible to filter only unread messages that require your attention.
  13. Support for multiple Companies.
    The new design allows managing multiple companies having separate licensing, software and /or policies from one Console.
  14. Server clustering
    Need to improve performance or balance a server load? New version of Jetico Central Manager Server supports creating a server cluster with multiple nodes to address these issues.