Corporate Versions
|
For corporate users, we strongly recommend the use of Cryptainer Enterprise.
|
|
Cryptainer Enterprise - Encrypting data at the user level is the easiest and most foolproof method of data security. Encryption functions at the most basic level, that of the data itself. This makes it an appropriate and necessary tool in network security.
|
|
Cryptainer Enterprise within a network environment serves as a solution to most issues besetting network administrators. The total cost of ownership (TCO) is a fraction of other products (like - Firewalls, Intrusion Detection Systems, etc.).
|
|
Additionally Cryptainer Enterprise solves additional issues that other products don't.
|
Access Control
|
Command Line Processing
|
Information Security
|
Minimizing Downtime
|
Cost Effectiveness
|
Familiar Windows Environment
|
No Training
|
Ease of Deployment and Installation
|
No Monitoring
|
Zero maintenance.
|
|
Cryptainer Enterprise has all the functionality of Cryptainer. The end-user interface is identical to that of Cryptainer the easy-to-use 448/128 bit encryption software. Cryptainer Enterprise ensures your privacy by keeping your data private and secure on your PC as well as removable storage. Specially tailored to meet the growing security and privacy needs of the corporate user, Cryptainer Enterprise combines the ease of use and simple drag-and-drop operations with strong encryption, to ensure total security, with a zero learning curve and maximum convenience.
|
|
Cryptainer Enterprise runs on all 32-bit versions of MS Windows (95/98/ME/2000/2003 Server as well as XP). It runs as a special Windows device driver operating on a 448 bit implementation of the Blowfish algorithm in Cipher Block Chaining (CBC) mode with a block size of 64 bits.
|
|
In addition, one can optionally use AES (or Rijndael) symmetric encryption algorithm. Effective May 26, 2002, AES is the official U.S. Government standard. It replaces the previous standard (DES).
|
The new AES meets the following criteria
|
- Resistance against all known attacks;
|
- Speed and code compactness on a wide range of platforms;
|
- Design simplicity.
|
|
The US National Institute of Standards and Technology (NIST) recommends that AES be used by U.S. Government organizations (and others) to protect sensitive information.
|
|
Cryptainer Enterprise creates encrypted drive(s) that can be loaded and unloaded as required. It stores all sensitive information in the form of encrypted files in a ghost drive that appears and disappears at your convenience. On loading this ghost drive using one's password/passphrase, any kind of file can be dragged and dropped into
|
it. Once unloaded, the data is rendered totally inaccessible by anyone but the person with the key. All your data is encrypted at an astonishing speed, in spite of the high bit-strength.
|
|
Using Cryptainer Enterprise it is now possible to encrypt files directly on any media, including removable media too (USB Drive/CD-Rom/CDRW). Cryptainer allows users to create standalone instances that load directly from the removable media without having to install anything permanent on the host machine. The sensitive data can be stored within an encrypted volume file that can only be accessed through the Cryptainer program and user-password.
|
|
Cryptainer Enterprise offers true on-the-fly disk encryption to ensure that absolutely anyone can use it effectively. No more password protecting files one at a time. No more deleting documents manually after encrypting them. With Cryptainer Enterprise encryption software, just drag, drop and unload to encrypt. What you get is foolproof, hassle-free, unbreakable security.
|
|
Cryptainer Enterprise creates a encrypted volume file that is then visible under window as a drive on access with a password. On dismounting, the data is encrypted. To contrast, copying encrypted files to any other file system type (FAT, FAT32, earlier versions of NTFS) using the Windows EFS will save the file in decrypted form. Cryptainer Files remain encrypted and there is no way that the contents are visible.
|
|
Cryptainer Enterprise offers command line processing for encrypting and decrypting files at the dos prompt. You can group a series of encryption and decryption commands in a single or multiple batch files and run it to get the desired results.
|
|
Cryptainer Enterprise provides you with single point control and monitoring of the distributed security system while retaining the privacy of end users who set their own passwords. This ensures the integrity of your data,and at the same time gives you flexibility and overall control. Cryptainer Enterprise allows the end users to act independently. To illustrate, users can set any type of password as they please. They can even create as many volumes as they need without any "monitoring".
|
|
At the same time, in the event of a contingency, it allows for the recovery of passwords of end users. To illustrate, if an employee leaves suddenly. In such a case, the data can be accessed by the administrator without any intervention by Cypherix® or any back doors of any kind.
|
|
This process is handled by an administrative module that allows for administrative oversight over passwords. Cypherix® is not involved in this process.
|
|
The administrative module also allows physical recovery of data sector by sector in a event of a absolute disaster.
|
|
If you need any further clarifications or have other questions, please do write to us or click here to go to our online support and feedback form.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|