Roxio Secure Burn Plus review

Roxio Secure Burn Plus could help you avoid the public embarrassment of losing optical discs containing sensitive data, so should you heed that burning sensation and rush out and buy it? Read our review first.

Even the most diligent, security-conscious firms will inevitably fall victim to human error and lose discs containing sensitive data. Roxio's Secure Burn Plus aims to prevent the most serious security consequences of such a loss strangers getting ahold of the important information on those discs. Secure Burn Plus encrypts and password protects optical discs such as CDs and DVDs so any private information should remain private, even if the disc is lost or stolen.

Secure Burn Plus is a complete disc writing program in its own right and is used in place of whatever disc burning software you currently use. IT administrators configure Secure Burn Plus by installing a Permissions Manager on each computer. Permissions Manager is then used to create user names and passwords. Those user accounts can be organised into groups which not only makes administration easier, but also allows finer grained control over security certain groups can be allowed to access discs burnt by other groups, but not vice-versa, for example. Permissions can also be set so that users don't need to input their password when viewing discs created by a colleague in their group.

The Permissions Manager is where you set user account details and security policies

The Permissions Manager is where you set user account details and security policies

Once you've finished configuring Secure Burn Plus, the Permissions Manager can be locked or deleted from the computer to prevent the user from making unauthorised changes. If deleted, the security polices will still be in force. A more sophisticated server-based management approach is available in the more expensive Roxio Secure Managed version of the software, but this isn't yet available in Europe for reasons Roxio has yet to reveal to us.

Featured Resources

How to be an MSP: Seven steps to success

Building your business from the ground up

Download now

The smart buyer’s guide to flash

Find out whether flash storage is right for your business

Download now

How MSPs build outperforming sales teams

The definitive guide to sales

Download now

The business guide to ransomware

Everything you need to know to keep your company afloat

Download now

Recommended

Cisco to acquire threat intelligence provider Kenna Security
Acquisition

Cisco to acquire threat intelligence provider Kenna Security

14 May 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

14 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
What’s next for the education sector?
Whitepaper

What’s next for the education sector?

14 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021