Which encryption method in BitLocker prevents attackers from accessing data?

Encrypt files, media and hard disks – securely, quickly and legally compliant. We offer four modules:

    • DriveLock DiskProtection

    • DriveLock BitLocker Management

    • DriveLock FileProtection

    • DriveLock Encryption 2-Go

Download Flyer

Which encryption method in BitLocker prevents attackers from accessing data?
Which encryption method in BitLocker prevents attackers from accessing data?

Encryption

DriveLock DiskProtection

Transparent and fast hard disk encryption

DriveLock BitLocker Management

Microsoft BitLocker hard disk encryption - supplemented by important additional functions

DriveLock FileProtection

Reliable directory and file encryption

DriveLock Encryption 2-Go

Encryption of removable media such as USB sticks, CD/DVD or removable drives

More Info

DriveLock Disk Protection

You lose your notebook or it gets stolen, your PC’s Windows password falls into the wrong hands: incidents that give attackers quick & easy access to your data. How do you prevent them?

DriveLock’s hard disk encryption meets the legal requirements of the GDPR for personal data and follows acknowledged  data encryption recommendations.

All advantages at a glance:

    • User or group-based encryption of files – easy to configure and deploy enterprise-wide
    • Possible on local computer, central directory of a server, an external USB data carrier or with a cloud-based service (e.g. Dropbox, Microsoft OneDrive, Google Drive)
    • For Windows and Mac OS X operating systems (cross-platform support)

Which encryption method in BitLocker prevents attackers from accessing data?
Which encryption method in BitLocker prevents attackers from accessing data?

DriveLock File Protection

The encryption of the entire storage medium is not always sensible or technically possible. Nevertheless, particularly sensitive company data (personnel or works council data or similar) must be protected against unauthorised access, e.g. by privileged users such as administrators.

DriveLock’s File and directory encryption allow privileged users to encrypt files & directories – ideal for project teams, works councils and management.

Which encryption method in BitLocker prevents attackers from accessing data?
Which encryption method in BitLocker prevents attackers from accessing data?

All advantages at a glance:

  • User or group-based encryption of files – easy to configure and deploy enterprise-wide
  • Possible on local computer, central directory of a server, an external USB data carrier or with a cloud-based service (e.g. Dropbox, Microsoft OneDrive, Google Drive)
  • For Windows and Mac OS X operating systems (cross-platform support)

DriveLock Encryption 2-Go

The exchange of data is still often done with the help of mobile data carriers such as USB sticks. Especially here the risk of data loss is high, be it through accidental loss or theft. Data can be copied within seconds without the person concerned noticing.

The Encryption 2-Go module encrypts data on external drives and data media securely and, if desired, transparently for the end-user. At the same time, you meet the legal requirements and effectively implement the measures to protect external media.

All advantages at a glance:

  • Encryption of files on storage media (USB sticks, CD/DVD, external hard drives)
  • Controlled encryption according to predefined company guidelines
  • Detection of drives already encrypted with BitLocker To Go
  • Container-based encryption or directory encryption
  • Configurable user selection dialogues when connecting external drives

Which encryption method in BitLocker prevents attackers from accessing data?
Which encryption method in BitLocker prevents attackers from accessing data?

Technical Details About These Modules

DriveLock DIsk Protection

  •  AES.NI support (hardware-supported, fast encryption)
  • FIPS 140-2 certified encryption module
  • Windows 7 – 10 systems with BIOS bootloader
  • Windows 10 (SAC and LTSC) with UEFI Bootloader
  • Supports Windows 10 In-place Upgrade and Windows Hibernation
  •  Use of recognised standardised encryption algorithms (XTS-AES-256/128, AES-CBC 256/128, Blowfish, IDEA etc.)Time-controlled or r
  • Remote deletion of files (“remote kill”) after loss or theft
  • Proven and fast recovery functions for data recovery without forced decryption
  • Centralised configuration of DriveLock Disk Protection independent of the Active Directory – even for computers without AD connection
  • Manage and analyse the security status of the system environment throughout the entire computer life cycle via the state-of-the-art, web-based DriveLock Control Center – the new DriveLock management console

DriveLock PBA (Included with DiskProtection)

Pre-Boot Authentication (DriveLock PBA) enables a secure, trustworthy start of the computer (Secure Boot) and ensures that the confidentiality of the stored data is maintained in case of loss or theft of the laptop or desktop. DriveLock PBA offers the following advantages:

What type of encryption methods does BitLocker use?

BitLocker uses Advanced Encryption Standard (AES) as its encryption algorithm with configurable key lengths of 128 bits or 256 bits. The default encryption setting is AES-128, but the options are configurable by using Group Policy.

How BitLocker protects my data?

BitLocker helps mitigate the unauthorized data access on lost or stolen computers by: Encrypting all user files and system files on the operating system drive. Assuring accessibility to data only if the computer's components appear unaltered and the encrypted disk is located in the original computer.

Should I use 128 or 256 AES?

Our best guidance is that AES-128 provides more than adequate security while being faster and more resource-efficient but readers who want that extra security provided by greater key sizes and more rounds in the algorithm should choose AES-256.

Which option prevents the offline attacks in BitLocker?

Trusted Platform Module BitLocker binds encryption keys with the TPM to ensure that a computer hasn't been tampered with while the system was offline.