Solutions

Encryption

You can encrypt:

  • files stored on local hard disks of your workstation;
  • files stored on removable media;
  • entire removable drives;
  • entire hard disk drives.

Encryption of files on local hard disks of a workstation

  • The administrator generates file lists in the policy according to file extensions or groups of extensions, and folders contained on hard disks of client hosts.
  • Next, the administrator creates actions in the policy to be used by the application to encrypt files belonging created by different software.
  • The application encrypts and decrypts files after applying the policy.

Encryption of data on removable media

  • The administrator creates a default encryption rule in the policy to be applied to all removable drives. This default rule has the lowest priority.
  • The administrator creates rules for individual removable device models.
  • The administrator creates rules for removable drives with paricular IDs. This is the top priority rule.
  • The application encrypts and decrypts files after applying the policy according to the rule priority.

Managing applications' access permissions to encrypted files

The administrator can configure rules of access to encrypted files for any software. Access can be either allowed (in the form of ciphertext only) or denied.

Creating encrypted archives

The user can create encrypted archives and password-protect them.

Encrypting hard disks

  • The administrator creates a default encryption rule for all hard disks in the policy.
  • The administrator generates a list of hard disks excluded from encryption.
  • After applying the policy, the application encrypts all logical partitions of hard disks sector by sector.

More solutions

sandbox

Sandbox is a security mechanism for separating running programs.

Read more

Two-factor authentication

Two-factor authentication (2FA) solutions help secure your company's digital assets from end to end.

Read more

skyfence

Skyfence Cloud Gateway is a cloud access security broker (CASB) that provides visibility and control over sanctioned and unsanctioned cloud apps.

Read more

DDI/NAC

Read more