USB DISK Hardware encryption for USB mass-storage peripherals IT IS IDEAL FOR: Anyone who wants to protect their data easily and safely housing them on an external memory (USB disk or USB key) The protection of files of any nature (legal documents, addresses, price lists, patents, technical drawings, images, video files, audio files, etc.) so as to share them only with people allowed to. 1. Carry out a complete backup to protect your files by saving them on an unlimited number of USB memories ( max dimension : 2TBs each ) in total safety. 2. Use an unlimited number of protected USB memories, everywhere you are. 3. Carry out a structural encryption so that the disk seems to be unformatted if Independencekey is not present. 4. Share only with those you have allowed to.
USB DISK Hardware encryption for USB mass-storage peripherals IT IS IDEAL FOR: Anyone who wants to protect their data easily and safely housing them on an external memory (USB disk or USB key) The protection of files of any nature (legal documents, addresses, price lists, patents, technical drawings, images, video files, audio files, etc.) so as to share them only with people allowed to. 1. Carry out a complete backup to protect your files by saving them on an unlimited number of USB memories ( max dimension : 2TBs each ) in total safety. 2. Use an unlimited number of protected USB memories, everywhere you are. 3. Carry out a structural encryption so that the disk seems to be unformatted if Independencekey is not present. 4. Share only with those you have allowed to.
USB DISK Hardware encryption for USB mass-storage peripherals WHAT IT DOES IndependenceKey encrypts any USB memory up to a max dimension of 2TBs and gives access to your data only to other IndependenceKey users you will have previously allowed to: your memory is protected, unlimited and shared only with the ones you want to! USB host PORT how it works In real time and at hardware level, it formats and encrypts all the USB memory sectors, cluster by cluster. All this, thanks to its USB 2.0 High speed HOST port. Now the service is very easy to use: if a protected disk is inserted behind your IndependenceKey you can see it and use it on your PC as you have always done. Otherwise, if you connect it directly to a PC USB port, the USB memory will not be recognised. Its entire content is encrypted, including the MBR (Master Boot Record) so the operative system will regard this storage device as a device to be initialized. In fact, it will contain all the user s data thoroughly protected inside. The data protection is fully hardware processed by acting on the SCSI commands that the computer sends during the data reading/writing phases inside the file system. USB memory writing speed File system used Power supply absorbed by IndependenceKey Up to 160 Mbps Irrelevant <200mW To learn more about us visit our website www.independencekey.com QUANTEC SA Corso San Gottardo, 86-6830 Chiasso, Switzerland Telephone: +41 (0) 91.6961616 - Fax: +41 (0) 91.6961610
CRYPT AND SHARE Data protection and sharing through a safe and exclusive Network. IT IS IDEAL FOR Those who want to share information using common exchange/sharing channels with no need to worry about security (mail attachments, Skype, etc). You can give access to your information only to the people you trust. You can create your own exclusive and independent file sharing Network with a simple pairing/association process. You can decide what and with whom you want to share your information on a case-tocase basis.
CRYPT AND SHARE Data protection and sharing through a safe and exclusive Network. IT IS IDEAL FOR Those who want to share information using common exchange/sharing channels with no need to worry about security (mail attachments, Skype, etc). You can give access to your information only to the people you trust. You can create your own exclusive and independent file sharing Network with a simple pairing/association process. You can decide what and with whom you want to share your information on a case-tocase basis.
CRYPT AND SHARE Data protection and sharing through a safe and exclusive Network. WHAT IT DOES The Crypt&Share function allows you to choose the people with whom you want to share your encrypted data, simply creating an association with other users and enabling any of them to access (at your choice) some or all your files. This process creates your private and protected Network. HOW IT DOES A protected file can be shared with whomever you want after the association/pairing process (either remote of physical) between users IndependenceKey. The physical association/pairing requires to simply connecting two IndependenceKeys through the USB host port. The remote association/pairing requires a simple operation through IndependenceKey software interface. The individual association/pairing keys between users are uniquely generated and safely kept inside each IndependenceKey. The device uses hardware anti-cloning and unique authentication systems, which make impossible any replay and man in the middle attacks. Every time a user wants to protect and share a file or a USB memory disk with another associated user, he/ she will just have to allow the other user to access his/her own files and thus be able to send them using common communication services (e.g. mail attachments, Skype, etc) The paring/association among IndependenceKeys allows users to create and freely use their safe Network of contacts. To learn more about this, visit www.independencekey.com QUANTEC SA Corso San Gottardo, 86-6830 Chiasso, Switzerland Telephone: +41 (0) 91.6961616 - Fax: +41 (0) 91.6961610
QDISK Hardware encrypted virtual disks on PCs. Optimized also for Cloud usage. IT IS IDEAL FOR Anyone who wants to work on confidential files whilst keeping them in his own PC in a constantly protected area. Anyone who wants to keep his own classified files in the Cloud. You can create a restricted and protected area always available inside your PC. You can automatically encrypt and decrypt files/folders by simply inserting or removing them from the protected area. You can make your virtual disks visible and available only with the use of your IndependenceKey. You can freely use the Cloud being sure that your data are fully protected regardless of the service provider.
QDISK Hardware encrypted virtual disks on PCs. Optimized also for Cloud usage. IT IS IDEAL FOR Anyone who wants to work on confidential files whilst keeping them in his own PC in a constantly protected area. Anyone who wants to keep his own classified files in the Cloud. You can create a restricted and protected area always available inside your PC. You can automatically encrypt and decrypt files/folders by simply inserting or removing them from the protected area. You can make your virtual disks visible and available only with the use of your IndependenceKey. You can freely use the Cloud being sure that your data are fully protected regardless of the service provider.
QDISK Hardware encrypted virtual disks on PCs. Optimized also for Cloud usage. WHAT IT DOES The QDISK function of IndependenceKey allows you to encrypt a custom size portion of your hard disk. HOW IT DOES Using the software interface of IndependenceKey, you create an encrypted disk by naming and associating it to a specific portion of your hard disk space. When IndependenceKey plugs into the PC, the operative system detects a disk drive as if it was a removable disk physically plugged into the PC; in reality, this does not correspond to a physical storage peripheral but to a file in the computer, a file container accessible only if IndependenceKey is plugged in. If you remove IndependenceKey from the computer, the protected virtual disk and all the files and folders in it will be no longer visible and accessible. This service has been specifically designed to be Cloud friendly, i.e. designed so that the QDISK synchronization operates at its best with the user s Cloud storage system. In fact, if the user modifies a file, protected and stored in the Cloud, only its modified blocks will be changed, therefore the synchronization engine of the Cloud service has to transfer onto the net only the minimum required information. To learn more about this, visit www.independencekey.com QUANTEC SA Corso San Gottardo, 86-6830 Chiasso, Switzerland Telephone: +41 (0) 91.6961616 - Fax: +41 (0) 91.6961610
TRASPARENT FILE ENCRYPTION Transparent use of encrypted files and folders without usage of decoded copies, thus leaving no trace behind. it is ideal for Those who want to work safely on their classified documents without wasting time and using the applications they have always used without changing their working habits. Access your files safely without decrypting them. Work freely; being sure that no decoded copies will be saved on your PC, not even temporarily. Open your files with a simple double click and use them normally without changing working habits.
TRASPARENT FILE ENCRYPTION Transparent use of encrypted files and folders without usage of decoded copies, thus leaving no trace behind. it is ideal for Those who want to work safely on their classified documents without wasting time and using the applications they have always used without changing their working habits. Access your files safely without decrypting them. Work freely; being sure that no decoded copies will be saved on your PC, not even temporarily. Open your files with a simple double click and use them normally without changing working habits.
TRASPARENT FILE ENCRYPTION Transparent use of encrypted files and folders without usage of decoded copies, thus leaving no trace behind. WHAT IT DOES IndependenceKey allows you to daily work without changing your habits, sure to use top safety levels. Once files are encrypted, you can access them with a simple double click. open any encrypted files WITH A DOUBLE CLICK HOW IT DOES Through a specific driver integrated with the file system of Operative System, IndependenceKey can directly work on encrypted files, making the necessary modifications without decrypting them first and without leaving any clear traces of the files in the PC. When the user double clicks on a file to open it, the request is detected by the driver installed in the computer and sent inside IndependenceKey to check for the correct encryption key. If we have the right to access the file, IndependenceKey (in real time and without delays) allows the application (e.g. Word) to open it, keeping it protected even during its modification phase, without ever exposing it to make it vulnerable. To learn more about this, visit www.independencekey.com QUANTEC SA Corso San Gottardo, 86-6830 Chiasso, Switzerland Telephone: +41 (0) 91.6961616 - Fax: +41 (0) 91.6961610
safe voip Real Time Hardware encrypted online calls. IT IS IDEAL FOR Anyone who wants to make a completely protected call, safely and easily. You can communicate as you have always done, just as in a normal call; directly, fast and with unparalleled security. Your call is absolutely safe call against any type of unlawful use: it is encrypted before entering the PC thus making any illegal attack vain, either on the PC or in the Net.
safe voip Real Time Hardware encrypted online calls. IT IS IDEAL FOR Anyone who wants to make a completely protected call, safely and easily. You can communicate as you have always done, just as in a normal call; directly, fast and with unparalleled security. Your call is absolutely safe call against any type of unlawful use: it is encrypted before entering the PC thus making any illegal attack vain, either on the PC or in the Net.
SAFE VOIP Real Time Hardware encrypted online calls. WHAT IT DOES The SAFE VOIP service of IndependenceKey generates and controls totally encrypted audio VoIP streams at the hardware level, in real time and with the utmost protection available. SUSAN MARK PC HOW IT DOES Using IndependenceKey s software and a normal USB headset connected to it, it is possible to call anyone who belongs to our private Network and is online at the time of the call. Once we call our contact with a simple click on the CALL button on the software screen, the audio stream will be encrypted on the basis of the association/pairing key previously established with the user with whom we want to talk to. Every VoIP session uses a unique encryption key, which will be different every time you need to make a call. Compared to common similar systems, the great advantage of IndependenceKey is that the audio stream is already encrypted before entering the computer, thus preventing any possible detection carried out by a software installed on the PC without the user knowing it. The audio VoIP packages physically enter the PC already encrypted by IndependenceKey, whilst the computer serves only as a transport channel towards the other user s PC. Should these packages ever be detected, it would be impossible to decode their content. To learn more about this, visit www.independencekey.com QUANTEC SA Corso San Gottardo, 86-6830 Chiasso, Switzerland Telephone: +41 (0) 91.6961616 - Fax: +41 (0) 91.6961610