Solutions

Encryption

You can encrypt:

  • files stored on local hard disks of your workstation;
  • files stored on removable media;
  • entire removable drives;
  • entire hard disk drives.

Encryption of files on local hard disks of a workstation

  • The administrator generates file lists in the policy according to file extensions or groups of extensions, and folders contained on hard disks of client hosts.
  • Next, the administrator creates actions in the policy to be used by the application to encrypt files belonging created by different software.
  • The application encrypts and decrypts files after applying the policy.

Encryption of data on removable media

  • The administrator creates a default encryption rule in the policy to be applied to all removable drives. This default rule has the lowest priority.
  • The administrator creates rules for individual removable device models.
  • The administrator creates rules for removable drives with paricular IDs. This is the top priority rule.
  • The application encrypts and decrypts files after applying the policy according to the rule priority.

Managing applications' access permissions to encrypted files

The administrator can configure rules of access to encrypted files for any software. Access can be either allowed (in the form of ciphertext only) or denied.

Creating encrypted archives

The user can create encrypted archives and password-protect them.

Encrypting hard disks

  • The administrator creates a default encryption rule for all hard disks in the policy.
  • The administrator generates a list of hard disks excluded from encryption.
  • After applying the policy, the application encrypts all logical partitions of hard disks sector by sector.

More solutions

mobile-security

Mobile security represents growing security area, its growth caused primarily by the growth in sales of mobile devices (smartphones, tablets, notebooks) and existence of BYOD.

Read more

ids/ips

Traditional Firewall solutions provides only a necessary first line of defense, but in today's IT are ineffective. Nwe attacks make use of weaknesses and failures of specific programs and applications.

Read more

Penetration Testing

Read more

SIEM and SOAR

Read more