Introduction


Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number of workstations involved. Jetico Central Manager – included as a feature in Enterprise Editions of Jetico software – is used to remotely deploy the software across all workstations, automatically update the software, monitor usage of encrypted containers and disk volumes, distribute security policies and centrally manage recovery information necessary to access encrypted data in case of emergency.

Jetico client software provides a wide range of data protection solutions on remote workstations – store selected files and folders in encrypted containers, encrypt whole disk partitions and dynamic disk volumes, wipe selected files and folders manually or automatically.

Proper use of any security software requires maintaining a specified common policy for an entire company. An IT Admin is able to use Jetico Central Manager to create special security tasks in a central database and automatically distribute them to remote computers. To further ensure safe usage of the client software, Jetico Central Manager gathers rescue information from remote computers. An Administrator could then use the rescue information in case of emergency, such as when users forget their passwords.

Beyond simply distributing tasks to remote computers and gathering information, Jetico Central Manager also allows an IT Admin to monitor user activity when they are running the client software. Log messages sent to the Jetico Central Manager Database report configuration changes as well as other security related events. The Administrator can also create reports in HTML format about the current state of the software on client computers.

Jetico Central Manager is a flexible and convenient tool for controlling client software on remote computers. Centrally managing a network of workstations immediately results in greater reliability and security – far superior to allowing a large organization of computers to independently run data protection software on their own.