Review: NMS for PC/PDA

By
Follow google news

This product has Professional or Enterprise editions and the latter has the Management Suite that features remote recovery management for forgotten passwords, mass deployment and more.

For Windows users, versions are available for 9x, Me, 2000, NT and XP. We installed on a Windows 2000 machine and were impressed with the fuss-free installation and close integration with Windows. From a user's perspective, this product is as intuitive as it gets.


This product has Professional or Enterprise editions and the latter has the Management Suite that features remote recovery management for forgotten passwords, mass deployment and more.

Choose the folders or drive you want encrypted and NMS for PC will (after encrypting any files there) encrypt files you save to the encrypted folder and decrypt them as you open them for further editing. This all happens so quickly and seamlessly that you are unaware of any additional process.

It can encrypt removable drives and shared network drives. Being folder based, it supports multiple users of one machine logging on as different users. NMS encrypts the Windows swap file and coexists happily with ScanDisk and Defrag as well as anti-virus software – we tested Norton AntiVirus on an encrypted folder and it worked well.

Integration with Explorer is what you expect. Right click on any folder and you can encrypt or decrypt straight from the pop-up dialog. Encrypted folders display a black dot as a visual reminder of their status, as do encrypted files.

In short, NMS for PC does what it claims to do with no fuss and at a cost that will appeal to both private users and corporate departments.

NMS for PDA similarly protects PDAs using Pocket PC, providing secure logon and encrypting portable media. It protects the ActiveSync PC connection, ensuring that protected data cannot be copied back and forth. The encryption and decryption process is transparent.

We liked the NMS products. They are straightforward, highly intuitive, easy to install and configure, well integrated with Windows and provide simple-to-use encryption to protect sensitive data with little or no learning curve.

For:

Transparent use, integration with Windows.


Against:

Very little.


Verdict:

An effective, user-oriented product.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Poor WA gov M365 security led to $71k theft and children's data breached

Poor WA gov M365 security led to $71k theft and children's data breached

Health and Aged Care CISO retires

Health and Aged Care CISO retires

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

US suspects China in breach of FBI surveillance network

US suspects China in breach of FBI surveillance network

Log In

  |  Forgot your password?