www.secure-it.com.my

ShareCrypt
Written by Ct R. Hamith   
Friday, 22 July 2011 08:30
ShareCrypt
The Problem

Do you think your company’s data is not safe enough? How do you limit the access of your information to your subordinates? Do you want to exchange information within one department without giving access to another? Do you want to do this within a network shared on a fileserver but don’t want the network administrator to read it?

The Solution

Protecting sensitive data and giving common access at the same time.

The ShareCrypt allows the transparent encrypting of data on network drives to protect sensitive information and effectively denies access to unauthorized users. Only those with a valid password for a drive can read or write data on it simultaneously. This client concept also prevents access of administrators. A client user sets up the encryption and manages access of other users by setting additional passwords.

 

448 Bit Shared Encryption

ShareCrypt is very easy to use and it encrypts data with strong encryption algorithms such as AES 256 bit and Blowfish 448 Bit.

Unlimited amount of encrypted disks/folders

ShareCrypt is fully scalable and allows the creation and management of an unlimited amount of encrypted disks/folders (The size of encrypted disks is also unlimited).

Storing Encrypted Data

With the ShareCrypt you are able to store encrypted data on network drives. First an authorized user has to initialize a drive once with a master password, then he can add as many as desired passwords to give other users access to the encrypted data.

Access to an Encrypted Network Drive

To get access to an encrypted network drive, a user only has to choose the appropriate drive letter and type in the password given away by the master user. This procedure can also be made automatic like connecting to a normal drive.

 

Last Updated ( Friday, 22 July 2011 08:55 )
 

Did You Know

arrow Identity theft is the top consumer complaint in the USA according to the Federal Trade Commission.

arrow US consumers reported fraud loss totalling more than $1.1 billion in 2006.

arrow Credit card fraud (25%) was the most common form of reported identity theft in the US in 2006.

arrow More than 100 000 people are affected by identity theft each year in the UK

arrow According to Privacy Rights Clearinghouse, more than 350 data loss incidents involving more than 140 million records have occurred since February 2005

arrow Organisations are obliged by law to take take adequate steps to ensure the proper disposal of data


You are here  :