Solutions

Encryption

You can encrypt:

  • files stored on local hard disks of your workstation;
  • files stored on removable media;
  • entire removable drives;
  • entire hard disk drives.

Encryption of files on local hard disks of a workstation

  • The administrator generates file lists in the policy according to file extensions or groups of extensions, and folders contained on hard disks of client hosts.
  • Next, the administrator creates actions in the policy to be used by the application to encrypt files belonging created by different software.
  • The application encrypts and decrypts files after applying the policy.

Encryption of data on removable media

  • The administrator creates a default encryption rule in the policy to be applied to all removable drives. This default rule has the lowest priority.
  • The administrator creates rules for individual removable device models.
  • The administrator creates rules for removable drives with paricular IDs. This is the top priority rule.
  • The application encrypts and decrypts files after applying the policy according to the rule priority.

Managing applications' access permissions to encrypted files

The administrator can configure rules of access to encrypted files for any software. Access can be either allowed (in the form of ciphertext only) or denied.

Creating encrypted archives

The user can create encrypted archives and password-protect them.

Encrypting hard disks

  • The administrator creates a default encryption rule for all hard disks in the policy.
  • The administrator generates a list of hard disks excluded from encryption.
  • After applying the policy, the application encrypts all logical partitions of hard disks sector by sector.

More solutions

byod

BYOD (Bring Your Own Device) is more and more common situation, in which you use your own device (smartphones, laptops, tablets, etc.) even for the company purpose. BYOD is quite a controversial topic and the opinions are often very polarized.

Read more

load-balancing

Load balancing (load balancing) is in network solutions technology, which distributes the load between two or more computers, network connections, processors, hard disks or other resources in order to achieve optimal resource utilization, maximize throughput, minimize response time and avoiding congestion.

Read more

ids/ips

Traditional Firewall solutions provides only a necessary first line of defense, but in today's IT are ineffective. Nwe attacks make use of weaknesses and failures of specific programs and applications.

Read more

firewall

Firewall is a network device which is used to manage and protect traffic between networks with different levels of reliability and security.

Read more