Solutions

Encryption

You can encrypt:

  • files stored on local hard disks of your workstation;
  • files stored on removable media;
  • entire removable drives;
  • entire hard disk drives.

Encryption of files on local hard disks of a workstation

  • The administrator generates file lists in the policy according to file extensions or groups of extensions, and folders contained on hard disks of client hosts.
  • Next, the administrator creates actions in the policy to be used by the application to encrypt files belonging created by different software.
  • The application encrypts and decrypts files after applying the policy.

Encryption of data on removable media

  • The administrator creates a default encryption rule in the policy to be applied to all removable drives. This default rule has the lowest priority.
  • The administrator creates rules for individual removable device models.
  • The administrator creates rules for removable drives with paricular IDs. This is the top priority rule.
  • The application encrypts and decrypts files after applying the policy according to the rule priority.

Managing applications' access permissions to encrypted files

The administrator can configure rules of access to encrypted files for any software. Access can be either allowed (in the form of ciphertext only) or denied.

Creating encrypted archives

The user can create encrypted archives and password-protect them.

Encrypting hard disks

  • The administrator creates a default encryption rule for all hard disks in the policy.
  • The administrator generates a list of hard disks excluded from encryption.
  • After applying the policy, the application encrypts all logical partitions of hard disks sector by sector.

More solutions

web-application-firewall

Web Application Firewall protects Web sites and Web applications from attackers who exploit vulnerabilities applications or protocols to steal data or to change the appearance of the organization's website.

Read more

email-security

Modern malicious programs or malware, include viruses, worms, Trojans and spyware are most common way for attack through e-mail.

Read more

firewall

Firewall is a network device which is used to manage and protect traffic between networks with different levels of reliability and security.

Read more

vpn

virtual private network (VPN) extends a private network across a public network, such as the Internet.

Read more