Join ZENworks Senior Product Manager Jason Blackett to see how you can leverage a user's Windows Login information to unlock their FDE-secured device.
Watch this short video to hear Novell President, Bob Flynn, talk about why now is a great time to do business with Novell.
Eric Varness, VP of Marketing talks to customers about the new features and benefits of Novell ZENworks 11 SP2, Full Disk Encryption, and Mac support.
Join ZENworks Senior Product Manager Jason Blackett to see how you update the user credentials on an FDE-secured device.
Join ZENworks Senior Product Manager Jason Blackett to see how you can authorize new users to an FDE-secured device.
Join ZENworks Senior Product Manager Jason Blackett to see how you can temporary decommission an FDE-secure device so that anyone, including it's assigned user, cannot access without using the Help Desk Challenge/Response process, or permanently decommission an FDE-secured device to permanently remove all data on the device.
Join ZENworks Senior Product Manager Jason Blackett to see how IT administrators can leverage the 'challenge/response' process to unlock an FDE-secured device remotely.
Join ZENworks Senior Product Manager Jason Blackett to see how you define the use of Pre-Boot Authentication Single Sign-On, reducing the prompts user's receive in order to login to their FDE-secured device.
Join ZENworks Senior Product Manager Jason Blackett to see how you define a policy to use Smart Card as the method for Pre-Boot Authentication when using ZENworks Full Disk Encryption.
Join ZENworks Senior Product Manager Jason Blackett to see how you can have a higher degree of security by enabling Pre-boot Authentication (PBA) within the Full Disk Encryption policy.
Join ZENworks Senior Product Manager Jason Blackett to see how you can enable the Full Disk Encryption policy, the latest product available with the release of SP2, within a ZENworks 11 environment.
Join ZENworks Senior Product Manager Jason Blackett to see how an administrator can configure the ZENworks Full Disk Encryption policy including deploying Full Disk Encryption to remote devices, defining partitions, drives and other details of the encryption policy, and validating that encryption has taken place.
