Frequently Asked Questions
NuSource General FAQ
- 01
NuSource's technology expertise and integration capability allow your leadership to move low-value transactions to an efficient self-serve technology, freeing up staff for more lucrative financial activities.
Our service and delivery is differentiated by its emphasis on technician training, remote resolution capabilities, specialized teams, and focus on software-related issues. These factors contribute to faster problem resolution, reduced downtime, and overall better client experience.

AppGuard/NuGuard
- 01
Using something in conjunction with Microsoft BitLocker for hard drive encryption is often recommended to strengthen security, ensure recoverability, or provide more granular control. Here are a few reasons why you might want to use BitLocker alongside other tools or features:
1. Key Management and Recovery
• Centralized Management: BitLocker alone handles encryption, but it may not be enough for organizations that need centralized
management of encryption keys, especially in large environments. Third-party solutions centralized control over key recovery, reporting, and auditing.
• Backup Key Storage: Some companies prefer additional solutions for backup and recovery of encryption keys. This ensures that if the BitLocker recovery key is lost, the data remains recoverable using a separate key management system.
2. Multi-Factor Authentication
• Enhanced Authentication: BitLocker can be enhanced with multi-factor authentication (MFA). This often requires combining BitLocker with other tools like TPM (Trusted Platform Module) chips and PIN codes, smartcards, or even biometric authentication to provide extra layers of protection.
3. Advanced Security Requirements
• Compliance Needs: In some cases, compliance standards (e.g., HIPAA, GDPR, or PCI-DSS) may require encryption solutions with more complex policies or reporting than what BitLocker alone provides. Using it in conjunction with compliance-oriented security solutions ensures that an organization meets all regulatory obligations.
• Tamper Protection: While BitLocker can prevent unauthorized access to a device's data, additional security tools can monitor and prevent tampering with the physical hardware or firmware. For example, solutions like Endpoint Detection and Response (EDR) systems or UEFI Secure Boot.
4. Granular Control and Reporting
• Audit and Reporting: BitLocker by itself provides limited auditing and logging. Security management platforms integrated with BitLocker allow for more detailed reporting on encryption status, user activity, and compliance monitoring, which is especially important in enterprise environments.
5. Data Loss Prevention (DLP)
• Data Integrity: BitLocker is focused on encrypting data at rest, but it doesn't prevent data from being exfiltrated or altered once the drive is unlocked. Combining BitLocker with Data Loss Prevention (DLP) solutions helps protect sensitive data from unauthorized sharing or access when the device is in use.
6. Cloud Integration and Remote Wipe
• Cloud Security: Many organizations use BitLocker in conjunction with cloud-based tools (e.g., Microsoft Intune, Azure) to manage remote encryption policies or enable features like remote wipe, which allows for the erasure of data if a device is lost or stolen.
Conclusion
While BitLocker provides robust hard drive encryption, combining it with additional tools or features helps ensure comprehensive data protection, especially in enterprise environments where security, compliance, and management are critical factors.
- 02
