Steganos SAFE PROFESSIONAL 2006 ver. 8.0.13
Why do you need Steganos Safe Professional?
Clear text data are a risk - especially for enterprises. Apart from hacker attacks and purposeful industrial espionage, there are often very simple things which compromise confidential data: An employee forgets his laptop on the train. During their lunch break, colleagues take a look at personnel data which are stored in a folder on the shared server. Hard drives with enterprise data are stolen during a break-in. Discarded computers still contain remainders of confidential information. During a PC repair, sensitive enterprise data are copied.
However, many enterprises have concerns about implementing strong encryption. How do you access data if an employee forgets about his password or - still worse - has an accident? What happens if an employee unexpectedly leaves the company? Or the contrary: How do you get your employees to use secure passwords, which are usually hard to remember? How can you specify who can access sensitive data and who can't?
Steganos Safe Professional provides solutions for these problems.
How does Steganos Safe work?
Steganos Safe Professional can contain an unlimited amount of confidential data - you can create any number of secure drives with a capacity of up to 64 GB each. In Steganos Safe Professional, AES, the world's most progressive encryption algorithm works with 256 bit long codes. Like all other Steganos encryptions this has never been cracked.
Apart from the manual password entry, data can also be encrypted via USB stick or mobile phone, for example. Thus, employees do not have to remember their passwords: They only have to connect their USB stick to make the safe open automatically. If someone forgets about his password or loses a key device, the administrator can use the Emergency Decryption Key (EDK) to access the data. The password chosen originally still remains secret. The use of these features can be configured and controlled via group policies.
Steganos Portable Safe turns a memory stick into a mobile safe: it can simply be decryted on every PC without installing additional software. This enables external employees to add new data very easily – as soon as the stick is removed, all information is encrypted. Alternatively, encrypted archives can be written to CD, DVD, or DVD-DL and therefore be securely transported. Naturally, this feature can be enabled and disabled for certain users via group policies.
Steganos Shredder permanently destroys unwanted documents or whole folders. The Deep Cleaning Shredder removes all junk data from every hard drive. This can be done by simply overwriting it if you want it to disappear quickly. Or, if you wish, you can use the technology employed by the US Department of Defense (DoD 5220.22M/NISPOM 8-306). You should use the extremely thorough Gutmann method for your most sensitive data as it overwrites 35 times.
Steganos Safe Professional can be installed and configured comfortably and centrally using Active Directory. Via group policies, the administrator can specify by whom and how certain Safe functions can be used. The minimum password requirements can be predefined: this ensures that all users use passwords of a certain security level. The usage of key devices for storing passwords can be specified as well as the usage of Data Shredder or Portable Safe. In addition, the Emergency Decription Key functionality can be enabled during installation: Thus, an authorized person can access encrypted data at any time if the key gets lost without having to reveal the password of the safe concerned.
Secure drives can be created not only on individual clients but also on the network. This means that several users can access data in a common safe simultaneously.http://www.megaupload.com/ru/?d=CRSGPCUY