Salient Features
|
Secure IT is the simplest and easiest way to secure and protect data.
|
|
· | Based on highly secure, open source, tried and tested AES and Blowfish algorithms: AES is the new official US government standard for encryption of data. Blowfish is known to be one of the strongest algorithms in existence and requires relatively little computing power (practically, a 1 MB file can be encrypted in 3 seconds or less on most desktops)
|
|
· | Impossible to break: AES at 128 bits is certified by NIST (National Institute of Standards and Technologies) to take 149 trillion years to break. (Using a machine that takes one second to crack a 56 bit DES key). Secure IT uses AES at 256 bits, making it practically impossible to break.
|
|
· | Built in file shredder - i.e. wiping the contents of the original pre-encrypted file beyond recovery to make sure that not even a trace remains after shredding. (Matching and exceeding the specifications of the U.S. Department of Defense)
|
|
· | No "back doors" in the software - No access possible under any circumstances. If you do not enter the correct password you cannot access the encrypted contents. There is no special procedure, secret code, or hidden entry method to fall back on.
|
|
· | Secure IT encrypts every kind of file whether spreadsheet, graphic, word processor or others, on every kind of medium, whether floppy disk, removable hard drive, zip drive, tape drive or other.
|
|
· | Ability to make self-extracting email attachments, which can be sent to people who do not have Secure IT. The program can be used to create self-extracting files. The recipient can unlock the data by just starting the self-extracting file within Windows and entering the password.
|
|
The only requirement for self-extracting files is that the recipients must be running some form of Microsoft Windows. All they need is the password to access the contents i.e. a totally secure system is possible without any modification to the existing mail system. The only requirement is that the mail system must support file attachments.
|
|
· | Intuitive interface - to minimize the learning curve, and make using the product easy to use.
|
|
· | Transparent to the end user - Designed to hide the complexities of encryption technology from the end user.
|
|
· | Command Line Options - Secure IT allows to encrypt and decrypt files from the Command Line. You can group a series of encryption and decryption commands in a single or multiple batch files and run it to get the desired results.
|