Data Security

Encrypting Data

Encryption is the most effective way to protect sensitive data

Full Disk Encryption

With hard disk encryption technology and USB removable media, all desktops and laptops can be easily and quickly protected.

File Encryption

With file encryption technology you can protect your data everywhere, wherever they are, once the content is encrypted as soon as it is created.

E-mail encryption

E-mail encryption requires the issuance of digital user authentication certificates and the exchange of encrypted messages takes place automatically after the digital certificates have been properly installed.

Full Disk Encryption

One of the most important security aspects of the terminals is full disk encryption. With encryption technology, all desktops and laptops can be protected easily and quickly. Using encryption technology can prevent data loss, make data management easy and compliance with security policy.

For encryption of a medium such as a computer’s hard drive or a removable USB, it is best to use built-in encryption functionality such as OPAL (USB), BitLocker (Windows), FileVault 2 (Mac) so that there is no delay from third-party tools and the process is done in a quick and simple way. The presence of a central console where all computers can be seen is necessary since all workstations can be managed well whether they are fixed or portable.

Details

  • Data Encryption is applicable to all Computers, such as desktop, laptop, hard disk and animated media.
  • Fast Data Recovery with a full range of recovery and repair tools
  • Full Support Opal Self-Encrypting, BitLocker, FileVault 2
  • Full Support for all Windows and Mac OSX releases
  • Detailed Compliance and Compliance Reports for users and encrypted devices
  • Deduction of Data Loss Prevention (DLP)
  • It is impossible to intercept data when the computer is closed

File Encryption

With file encryption, you can protect your data everywhere, wherever they are, once the content is encrypted as soon as it is created. File Encryption systems protect your data with user authentication before allowing access to encrypted data. With file encryption, all data remains encrypted even when transferred to a shared folder, removable USB media or cloud.

Now, file-level encryption does not mean long-term installations by administrators or the selection of files to be encrypted. User files start with the highest security level preselection to keep sensitive information away from the wrong hands and then remove certain files from that policy.

Details

  • Data protection even if they are outside the perimeter
  • It is impossible to intercept data even if the computer is open
  • Ability to automatically encrypt files that are placed in a specific folder with sensitive data
  • It is impossible to intercept data even if the computer is open

Email Encryption

The security level after installing and customizing an e-mail encryption system is particularly high. E-mail encryption systems work in an easy way, allowing centralized management from one point, with the advantage being that installation and maintenance of the system are particularly easy.

The advantage of circumferential encryption of e-mail protection is a disadvantage of this kind of way that a secure physical interface is required between the perimeter security system and the e-mail server in which there is no encryption as it is perimetrically. The advantage is that installation and maintenance of the system are very easy since it is done in a single point, the perimeter security system.

Details

  • Easy and quick customization
  • Extremely high-security email traffic
  • Low cost of ownership
  • Digital signature & encryption of emails
  • No additional software is required for the end user for encryption and decryption
  • S / MIME & OpenPGP support
  • Centrally manage all keys and certificates
  • Support for external certification authorities