Reviews

Roxio Secure Burn Plus review

Roxio Secure Burn Plus could help you avoid the public embarrassment of losing optical discs containing sensitive data, so should you heed that burning sensation and rush out and buy it? Read our review first.

Even the most diligent, security-conscious firms will inevitably fall victim to human error and lose discs containing sensitive data. Roxio's Secure Burn Plus aims to prevent the most serious security consequences of such a loss strangers getting ahold of the important information on those discs. Secure Burn Plus encrypts and password protects optical discs such as CDs and DVDs so any private information should remain private, even if the disc is lost or stolen.

Secure Burn Plus is a complete disc writing program in its own right and is used in place of whatever disc burning software you currently use. IT administrators configure Secure Burn Plus by installing a Permissions Manager on each computer. Permissions Manager is then used to create user names and passwords. Those user accounts can be organised into groups which not only makes administration easier, but also allows finer grained control over security certain groups can be allowed to access discs burnt by other groups, but not vice-versa, for example. Permissions can also be set so that users don't need to input their password when viewing discs created by a colleague in their group.

The Permissions Manager is where you set user account details and security policies

The Permissions Manager is where you set user account details and security policies

Once you've finished configuring Secure Burn Plus, the Permissions Manager can be locked or deleted from the computer to prevent the user from making unauthorised changes. If deleted, the security polices will still be in force. A more sophisticated server-based management approach is available in the more expensive Roxio Secure Managed version of the software, but this isn't yet available in Europe for reasons Roxio has yet to reveal to us.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Identity Automation launches credential breach monitoring service
phishing

Identity Automation launches credential breach monitoring service

5 Oct 2021
Neiman Marcus data breach hits 4.6 million customers
data breaches

Neiman Marcus data breach hits 4.6 million customers

4 Oct 2021
Indiana notifies 750,000 after COVID-19 tracing data accessed
data breaches

Indiana notifies 750,000 after COVID-19 tracing data accessed

18 Aug 2021
Pearson fined $1 million for downplaying severity of 2018 breach
data breaches

Pearson fined $1 million for downplaying severity of 2018 breach

17 Aug 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021