Hi there
the 2 PIN method is a challenge response system using the checkpoint software. You would have to boot the device to enter these details. If I remember correctly this method does not actually decrypt the device, but it does give you access.
The second method is utilises the companies admin accounts to decrypt the data, and a recovery CD (or USB in this case) with a checkpoint utility
Although I haven't tried it, the Encase method should work using the same details that the company would supply for the recovery CD, ie an account with rights to decrypt the drive, not the users credentials.
↧