24 Jan 2010
This video is a demonstration of an end user installation to give you an idea of the process and how simple it is - the video quite large so may take a…
Before installating the encryption software you must run a CHKDSK to make sure that the hard drive is mechanically healthy. It is also vital that you run the CHKDSK with the /R…
[swfobj src="http://faq.scomis.org/wp-content/uploads/2010/01/Putting-the-ScoMIS-Encryption-Service-Setup-Package-on-the-network.swf" width="640" height="480" align="center"]     Reviewed 22/12/2014  
23 Jan 2010
This short video will take you through downloading the encryption software setup package [swfobj src="http://faq.scomis.org/wp-content/uploads/2010/01/upgrades.swf" width="640" height="480" align="center"]       Reviewed 22/12/2014.
20 Jan 2010
On protected devices for example Laptops or PCs, the client side of Endpoint Encryption, in simple terms, takes control of the user’s hard disk away from the operating system.  Endpoint Encryption’s driver…
Important Update: Please read http://faq.scomis.org/kb930 before installing onto Toshiba Satellite Pro Notebooks There are two sets of documentation which have been split into Primary / Secondary routes for installation.  Broadly these equate…