First look at the most important version in the history of EgoSecure

At this year’s CeBIT we will present the new product version 12. From our point of view, this is the most important version in EgoSecure’s product history, because, aside from the intelligent expansion of the Insight solution approach “first understand, then protect”, there are as many new features as never before.
The Insight solution approach was introduced in the version 11 and finally put an end to “blind security”. EgoSecure became the first manufacturer in the world to integrate data flow analysis and data protection into one solution.

Insight, however, has no intelligence, because it primarily collects facts and presents those, in the form of graphs and tables, for the management and the administrators. That is, of course, also an important step, if one does not want to implement IT security solutions blindly. Our new module IntellAct goes a step further. It evaluates the facts and triggers protective measures automatically based on previously defined rules. Another possibility is the comparison with the normal values in order to recognize the anomalies or critical situations automatically and trigger the corresponding protective reaction. This automatism facilitates the work of the administrators and minimizes the reaction times significantly. The automation of IT security is a current trend, which is being discussed and demanded at security conferences around the world.
Other important new features of version 12 are:

  • – A permanent encryption, which, as an alternative to our on-the-fly encryption, implements container encryption and may be necessary in some cases.
  • – The separation of Pre Boot Authentication from Full Disk Encryption, which makes both functions even more flexible and allows Pre Boot Authentication for BitLocker.
  • – Simultaneous support of multiple hard disks through our Full Disk Encryption solution.
  • – The password manager, which creates a “simply beautiful solution” to the jungle of passwords and allows the safe storage and administration of confidential information.
  • – UEFI Based PBA, which has no hardware dependencies.
  • – Adaptive Boot Mode (ABM), which automatically solves potential problems with new or unknown hardware. After the restart, ABM simply tries to boot a “shrunk” installation – until a working version has been found that supports as many functions as possible. This means that an executable version is always available – the software practically fixes the problem itself.
  • – A 2-factor authentication for all types of encryption – for cloud, USB, folder or network encryption.
  • – Extensions for application control.
  • – Different ways to software inventory.
  • – The possibility to install additional encryption providers as an alternative to the AES or RSA encryption algorithms.