PLUS PACK 2.8. http://www.securstar.com



Similar documents
Kaspersky Lab s Full Disk Encryption Technology

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

SecureD Technical Overview

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

SecureAge SecureDs Data Breach Prevention Solution

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

Innovative Secure Boot System (SBS) with a smartcard.

Enova X-Wall LX Frequently Asked Questions

etoken Single Sign-On 3.0

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Protecting Your Data On The Network, Cloud And Virtual Servers

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Using End User Device Encryption to Protect Sensitive Information

How Endpoint Encryption Works

Navigating Endpoint Encryption Technologies

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Comprehensive Endpoint Security

Full Drive Encryption Security Problem Definition - Encryption Engine

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS)

Comodo Disk Encryption

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

The virtual safe: A user-focused approach to data encryption

Check Point FDE integration with Digipass Key devices

Firmware security features in HP Compaq business notebooks

CRYPTAS it-security GmbH

BEST PRACTICES. Encryption.

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

How To Use Pki On A Pc (For A Non-Profit)

How Drive Encryption Works

Aegis Padlock for business

ScoMIS Encryption Service

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Secure USB Flash Drive. Biometric & Professional Drives

White Paper: Whole Disk Encryption

Gold Lock Desktop White Paper

Encrypted Communication Based on BlockChain and PKI Technology.

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

Certification Report

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Dashlane Security Whitepaper

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

CRYPTOGRAPHY IN NETWORK SECURITY

Self-Encrypting Hard Disk Drives in the Data Center

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

Projectplace: A Secure Project Collaboration Solution

Security Architecture Whitepaper

Healthcare Compliance Solutions

PGP Whole Disk Encryption Implementation

Encryption Buyers Guide

Secure Data Exchange Solution

SecureDoc for Mac v6.1. User Manual

PCI Data Security Standards (DSS)

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P:

How To Use A College Computer System Safely

The Key to Secure Online Financial Transactions

Chapter 1: Introduction

Full Disk Encryption Policy Reference

Driving Company Security is Challenging. Centralized Management Makes it Simple.

DriveLock and Windows 7

Complying with PCI Data Security

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Excerpt of Cyber Security Policy/Standard S Information Security Standards

Chapter 23. Database Security. Security Issues. Database Security

DRAFT Standard Statement Encryption

Data Security Incident Response Plan. [Insert Organization Name]

USB Portable Storage Device: Security Problem Definition Summary

Samsung SED Security in Collaboration with Wave Systems

USB Portable Storage Device: Security Problem Definition Summary

BMC s Security Strategy for ITSM in the SaaS Environment

Securing Data on Portable Media.

Full Disk Encryption Agent Reference

Hardware Security Modules for Protecting Embedded Systems

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

ACER ProShield. Table of Contents

ScoMIS Encryption Service

How To Encrypt Data With Encryption

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Secure Network Communications FIPS Non Proprietary Security Policy

S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd.

Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution

What users should know about Full Disk Encryption based on LUKS

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

The True Story of Data-At-Rest Encryption & the Cloud

Transcription:

DESCRIPTION [ Do I need security? ] Almost every computer contains sensitive data that must be protected against unauthorized access and intrusion. This data could be in the form of corporate and confidential information such as management analyses, research data or personal files. Valuable, paperbased documents would typically be filed away from prying eyes, stored in lockers and safes. Electronic documents, in particular, need special protection to prohibit unauthorized misuse and manipulation, a solution that works as effectively as an electronic safe for stored documents. Whether the information is corporate or personal, published secure data can result in breaches of confidentiality, financial loss or litigation. Moreover, in addition to internal guidelines there are also legal regulations for the protection of personal data. [ Why DriveCrypt? ] DriveCrypt Plus Pack is a full disk encryption software package which can encrypt the whole operating system, as well as secondary disks, and allows pre-boot authentication (user being able to enter a password before the computer boots into the operating system). Needed processor resources < 3% Machine s processing performance trusted, validated algorithm chosen by the National Institute of Standards and Technology (NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be used by U.S. Government organizations (and others) to protect sensitive information. DriveCrypt Plus Pack provides true real-time "on the fly" 256-bit disk encryption. Providing advanced FDE (Full disk encryption) as opposed to VDE (Virtual disk encryption) or "container" encryption, DCPP is an important evolutionary step in the field of transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a DCPP is automatic and completely transparent to the user. Not only does this decrease user involvement and training requirements, but also it creates the foundation for enforceable security. The careful integration of boot protection and automatic encryption provides a high degree of security with minimal impact on users. Boot protection prevents subversion of the operating system (via floppy boot-up, for example) or the introduction of rogue programs while sector by sector encryption makes it impossible to copy individual files for brute force attacks. DCPP safeguards the operating system and the important system files, as well as temporary- and swap files. (which often contain clues to passwords for Windows). DCPP is the fastest and most feature-rich realtime encryption system available. Special care has been taken to render all cryptographic parts as invisible & transparent as possible.

FEATURES [ Strong 256bit AES encryption ] DCPP ensures that only authorized users may access a computer by securely protecting disks and removable media with a powerful and proven AES-256 bit encryption at the sector level. AES-256 is a FIPSapproved symmetric encryption algorithm that is used by U.S. Government organizations (and others) to protect sensitive information. [ Full disk encryption ] DCPP uses automatic and transparent Full Disk Encryption (FDE) offering several key advantages relative to file encryption. FDE secures the operating system, temp and swap files that often contain sensitive data but are missed by file encryption. FDE is performed sector by sector without creating temp or backup files: As a result, large files will decrypt without delay whereas file encryption is normally much slower. [ Pre-boot authentication ] With DCPP the user is authenticated by means of pre-boot authentication (PBA) before the system is started and therefore before the operating system is booted. This kind of authentication cannot be manipulated, PBA therefore guarantees maximum security. Neither keys nor passwords are stored on the PC's hard disk. All of the information required to boot the operating system is derived from the password. This makes the use of hard disk tools for analyzing the hard disk completely ineffective. [ External hardware control ] DCPP can work in combination with external hardware devices such as the USB Tokens from Aladdin and Rainbow at the pre-boot level. This allows a two level authentication. [ Hide your keystores into picutres and music files ] Using special so called "Steganographic" functionalities, DCPP can hide keystores inside a bitmap or a wav file. Just authorized users will be able to access their keystores, anyone else will see harmless pictures or music. [ Password sniffing protection ] DCPP integrates special functionalities that prevent passwords from being sniffed by hackers or trojan horses such as Back Orifice, SubSeven etc... [ Lockout console for unattended computers ] DCPP offers a special "Lockout Console" function allowing to block the access to the computer, whenever the machine is unattended. The Local console securely hides the working screen and only allows people to work after they re-authenticated themselves.

COMPANY [ About SecurStar ] SecurStar GmbH is a leading German computer security company founded 2001, from the merger of ScramDisk Inc., Software Professionals Ltd, Capital Information Services and Telstar Industries. SecurStar was primarily established owing to the special security needs of telephone companies such as Global Telecom, manufacturing industries such as Centurion Technologies, and state defence departments of several countries. With this merger, SecurStar evolved into a leading IT-security company. Although the company is relatively new, its founding partners were providing security products and security consultancy services since 1995, some of the most famous products provided by our founders were Scramdisk and E4M, which in the past were a defacto standard in hard disk encryption. Only one year after its incorporation, SecurStar sold more than 4.5 million encryption software licenses, ranking number one worldwide in the hard disk encryption software provider league. SecurStar s major business activities are : Development and production of cryptographic software and hardware Research and manufacturing of new IT-security systems (software and hardware based) Consultancy in the field of data security Computer and network security Programming services [ Our customers ] [ Partners ] [ Software reviewed by ]

CONTACT US [ Contact us ] SecurStar GmbH is a German company incorporated in Munich (HRB 139695) Its principal office (administrative only) is based in Munich, and branch offices are in France, England, Netherlands, USA, Hong Kong and Romania. Please contact us at: SecurStar GmbH Les Balcons du Port, Bât 2 7 Allée des Phalcnes F-06600 Antibes France Tel : +1-646 - 435 0976 Fax : +1-206 - 600 4365 Or by Email at : Administrative: office@securstar.com Customer support: support@securstar.com Webmaster: webmaster@securstar.com Or for any other information: info@securstar.com You can visit our website at: