Conseal USB
"I'm hard-pushed to think of any other solution that gives the average small business such cost-effective mobile data security, and gives it in such a readily accessible format."
Davey Winder, PC Pro, June 2011
"A completely watertight and easy to use security system" * * * * *
Matt Hanson, PC Plus, June 2011

Conseal USB

Buy Conseal USB Try Conseal USB

 

Consealing a new device

1. Install and run Conseal USB

2. Insert the device to be Consealed

3. Click "Conseal This"

Self destruct a device

If a Consealed device is lost or stolen, you can remotely destroy its contents.

1. Log in to the Management Console

2. Select the lost device

3. Click "Self destruct device"

See who has accessed your data

All attempts to unlock Consealed devices are logged, whether successful or unsuccessful.

1. Log in to the Management Console

2. Select the device of interest

3. Click "View history in detail"

Define who can access your data

Conseal lets you specify who can unlock protected devices, where they have to be, and when.

1. Log in to the Management Console

2. Select the device to configure

3. Click "Configure access"

Receive alerts

Set up email alerts warning of attempted access to your Consealed device.

1. Log in to the Management Console

2. Select the device to configure

3. Click "Configure alerting"