BEM’s user management permits administrators to remove and control different levels of user access to devices and data. A password policy manager is integrated within user management to govern password complexity, expiration cycles and forgotten passwords, which can be reset remotely.
BEM works with standard third party deployment tools as well as different domains to ensure that the roll out of encryption is faster and subsequent management overheads are minimised.
Audit and Reporting
Every user event is logged and reported in the BEM database, such events include; unsuccessful logon, successful logon, plugged in media and access to data. All user actions are reported and can be audited quickly, giving the organisation the ability to demonstrate compliance with minimal fuss.