Corporate Versions

Return to Introduction  Previous  Next

For corporate users, we strongly recommend the use of Cypherix SE.


Cypherix SE - Encrypting data at the user level is the easiest and most foolproof method of data security. Encryption functions at the most basic level, that of the data itself. This makes it an appropriate and necessary tool in network security.


Cypherix SE within a network environment serves as a solution to most issues besetting network administrators. The total cost of ownership (TCO) is a fraction of other products (like - Firewalls, Intrusion Detection Systems, etc.).


Additionally Cypherix SE solves additional issues that other products don't.

Bullet Access Control

Bullet Command Line Processing

Bullet Information Security

Bullet Minimizing Downtime

Bullet Cost Effectiveness

Bullet Familiar Windows Environment

Bullet No Training

Bullet Ease of Deployment and Installation

Bullet No Monitoring

Bullet Zero maintenance.


Cypherix SE has all the functionality of Cypherix. The end-user interface is identical to that of Cypherix the easy-to-use 448 bit encryption software. Cypherix SE ensures your privacy by keeping your data private and secure on your PC as well as removable storage. Specially tailored to meet the growing security and privacy needs of the corporate user, Cypherix SE combines the ease of use and simple drag-and-drop operations with strong encryption, to ensure total security, with a zero learning curve and maximum convenience.


Cypherix SE runs on all 32-bit versions of MS Windows (95/98/ME/2000/2003 Server as well as XP). It runs as a special Windows device driver operating on a 448 bit implementation of the Blowfish algorithm in Cipher Block Chaining (CBC) mode with a block size of 64 bits.


In addition, one can optionally use AES (or Rijndael) symmetric encryption algorithm. Effective May 26, 2002, AES is the official U.S. Government standard. It replaces the previous standard (DES).

The new AES meets the following criteria

   - Resistance against all known attacks;

   - Speed and code compactness on a wide range of platforms;

   - Design simplicity.


The US National Institute of Standards and Technology (NIST) recommends that AES be used by U.S. Government organizations (and others) to protect sensitive information.


Cypherix SE creates encrypted drive(s) that can be loaded and unloaded as required. It stores all sensitive information in the form of encrypted files in a ghost drive that appears and disappears at your convenience. On loading this ghost drive using one's password/passphrase, any kind of file can be dragged and dropped into

it. Once unloaded, the data is rendered totally inaccessible by anyone but the person with the key. All your data is encrypted at an astonishing speed, in spite of the high bit-strength.


Using Cypherix SE it is now possible to encrypt files directly on any media, including removable media too (USB Drive/CD-Rom/CDRW). Cypherix allows users to create standalone instances that load directly from the removable media without having to install anything permanent on the host machine. The sensitive data can be stored within an encrypted volume file that can only be accessed through the Cypherix program and user-password.


Cypherix SE offers true on-the-fly disk encryption to ensure that absolutely anyone can use it effectively. No more password protecting files one at a time. No more deleting documents manually after encrypting them. With Cypherix SE encryption software, just drag, drop and unload to encrypt. What you get is foolproof, hassle-free, unbreakable security.


Cypherix SE creates a encrypted volume file that is then visible under window as a drive on access with a password. On dismounting, the data is encrypted. To contrast, copying encrypted files to any other file system type (FAT, FAT32, earlier versions of NTFS) using the Windows EFS will save the file in decrypted form. Cypherix Files remain encrypted and there is no way that the contents are visible.


Cypherix SE offers command line processing for encrypting and decrypting files at the dos prompt. You can group a series of encryption and decryption commands in a single or multiple batch files and run it to get the desired results.


Cypherix SE provides you with single point control and monitoring of the distributed security system while retaining the privacy of end users who set their own passwords. This ensures the integrity of your data,and at the same time gives you flexibility and overall control.  Cypherix SE allows the end users to act independently. To illustrate, users can set any type of password as they please. They can even create as many volumes as they need without any "monitoring".


At the same time, in the event of a contingency, it allows for the recovery of passwords of end users. To illustrate, if an employee leaves suddenly. In such a case, the data can be accessed by the administrator without any intervention by Cypherix or any back doors of any kind.


This process is handled by an administrative module that allows for administrative oversight over passwords. Cypherix is not involved in this process.


The administrative module also allows physical recovery of data sector by sector in a event of a absolute disaster.


If you wish to receive an evaluation copy of Cypherix SE, need any further clarifications or have other questions, please do write to us or  click here to access our Live Support Online desk.