The primary purpose of Jetico Central Manager is to provide the administrator of an enterprise network with a program to control client software on remote workstations. Jetico Central Manager controls the following client software:
BCWipe: permanently delete selected data files on active workstations, including wipe free space.
BCWipe can run different kinds of wiping tasks (wipe free space of disk drives, wipe temporary files or remnants of activity of programs like Internet Browsers, etc.). Every BCWipe Task can be run automatically according to schedule.
With Jetico Central Manager, an administrator can create a BCWipe Task Set which consists of different types of BCWipe tasks. Then an administrator can configure BCWipe software on remote computers to run wiping tasks according to the Task Set.
Administrator can create as many BCWipe Task Sets as needed. Every Task Set can be assigned to different computers or group of computers in the company network. Article Central Management of BCWipe explains how it can be done in detail.
BestCrypt Container Encryption: store selected files or folders in encrypted containers with access to data through virtual drives.
BestCrypt runs encrypt/decrypt operations transparently for the user as soon as a proper password for the container is entered.
Administrator of Jetico Central Manager can configure BestCrypt Container Encryption on client computers to send information about encrypted container files to central database. Communication between client computers and server as well as information inside the database is encrypted. Only Supervisor or Administrator of the Jetico Central Manager Database can use the information about encrypted container in order to access the data inside the container in emergency cases, for example, if the user forgets password for the encrypted container.
Read more about remote control of BestCrypt Container Encryption software in the Central Management of BestCrypt Container Encryption article.
BestCrypt Volume Encryption: encrypt all data stored on whole Windows partitions or volumes.
Jetico Central Manager is used to monitor usage of encrypted disk volumes, distribute encryption policies and centrally manage recovery information necessary to access encrypted data in case of emergency.
With Jetico Central Manager, an administrator can initiate encryption/decryption of the client computers remotely from JCM Console. On client side, end-user only needs to enter/set password to initiate encryption as configured by Administrator in JCM. Besides, JCM provides a way to set a protection policy for removable disks. Read article Removable Disks Protection for more information.
The Jetico Central Manager Database receives information about encrypted disk volumes from client computers through secure communication channel. The information includes disk volume configuration of the computers and rescue information. Administrator can use the rescue information for recovery purposes, for example, if file system on encrypted disk volume becomes damaged.
Read more about remote administrating of the software in Central Management of BestCrypt Volume Encryption article.
Jetico Central Manager provides logging of the events happened on remote computers and logging of every action performed by Administrator in the Jetico Central Manager Console. Log information can be viewed at the right pane of the Jetico Central Manager Console at the corresponding client software tab. For example, to monitor BCWipe Log it is necessary to open BCWipe tab.
Choose Show for all items option from the combo-box to display the events for all computers. To view the Log for specific computers select the needed computers in the left pane, then choose Show for selected items option from the combo-box at the right side. To hide the Log field press Do not show. It is possible to view the log events starting from the specific date - tick the box Since date and choose the date.
The following columns can be displayed in the Log field: Date, Time, Computer, Action and others. To hide/show columns right-click on the column name and mark the desired columns.
The maximum size of the Log File can be set in the Reports and Logs menu of Jetico Central Manager Console - Log File Settings command.
The picture in the article Central Management of BestCrypt Container Encryption shows how the Log looks like.