Implement cover-all prevention.
Mitigate the risks of losing corporate data, user data, source code, and more by encrypting all disks and detachable drives.
Secure data on remote workers effortlessly.
Ensure data handled by remote workers on their devices is safe without the hassle. Encrypt remotely, with an efficient and easy to use interface.
Comply with data regulations.
Meet security certification or gubernamental regulations that require disk encryption, such as ISO/IEC, HIPAA or GDPR.
When someone in your workforce takes a corporate device somewhere out of your reach, an encrypted disk avoids the chances of a data leak.
Device Loss or Theft
If a device is stolen or taken by a rogue employee, disk encryption ensures unwanted access to corporate data is mitigated.
Encrypted endpoints can significantly reduce the danger of a data breach, and without the encryption keys, render any stolen files useless.
Select a compatible Windows device (Windows 10 Pro, Enterprise, or Education).
Open the Disk Encryption tool, and select the target disks to be encrypted.
Select the encryption method: full disk or used space only if the system is brand new.
Select your encryption standard (AES_128 or XTS_AES128) and click Start Encryption!
Select a Windows device that has disks encrypted via Prey’s Disk Encryption tool.
Open the Disk Encryption tool, and select the target disks to be decrypted.
Click decrypt and Prey will initiate the process.