Client Login
Forgot Password? 
|
|
|
|
 
 
IceLock Corporate Edition

No Compromise Data Protection

IceLock provides military strength encryption to keep sensitive data on laptops safe. Its web-based policy management and deployment services make it the most cost-effective, easy to implement encryption solution for organizations of all sizes.

Resources

IceLock Quick Start and Installation Guide (pdf)
Implementation Plan Templates (pdf) (doc)
FAQ

More Resources
Free 30-Day Evaluation Kit

Order Now

For More Information click here to be contacted by a HyBlue salesperson to answer your questions.
Encryption Plus Protection

If a hacker tries to access your computer or your data, IceLock is watching. If a hacker repeatedly fails to login to Windows or IceLock, the IceLock Agent takes aggressive action to cripple itself, protecting your data from further hack attempts. With IceLock’s unique dual layer, multi factor keys, this action can be reversed if a user simply forgot their password. Complete data protection and simple recovery from user errors. See how IceLock protects your data here.

Service Center Features

IceLock includes web-based key management and policy administration to dramatically speed deployment, control costs and keep overhead down

Powerful, Centralized Administration

  • Reset user passwords
  • Recover from multiple login failures
  • Set password failure policy
  • Mark laptop as lost or stolen
  • Set lost laptop data destruction policy

Most Secure

IceLock takes an aggressive approach to keys in RAM, which protects encryption keys against the “cold boot” exploit. During any system transition (e.g. hibernation, power-off, log-off, screen saver activation) all keys are deleted from RAM and overwritten with random data.

Protects against “Cold Boot” and other RAM targeting exploits

IceLock makes its operations invisible to users by integrating with the user's familiar login process. The rest of the authentication, monitoring and encryption machinery is hidden from the user's view, making IceLock the simplest, lowest friction data security solution available, for both users and administrators.

Easy to Use, So it Gets Used

IceLock makes its operations invisible to users by integrating with the user's familiar login process. The rest of the authentication, monitoring and encryption machinery is hidden from the user's view, making IceLock the simplest, lowest friction data security solution available, for both users and administrators.

 
Copyright © 2005-2008 HyBlue, Inc. Privacy Policy    Terms of Service & Legal    Company   Other Services   Partners