Download brochure
Request for Information
Request for Quote/Pricing
BUY NOW @Earlyon Store

Disk Encryption Software Solution

Overview

Our disk encryption software securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this disk encryption product.

With its Traveller modus functionality, the disk encryption is the ideal solution to encrypt USB disks and Pen drives without needing to install the software on the computer.

How Disk Encryption Software Works

As data is read from the hard disk, disk encryption software automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The disk encryption/ decryption process is completely transparent to the user or any application program -the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC. In addition, only individual files are decrypted at any one time, not the whole hard disk.

Key Features

  • Strong Cryptography
  • Easy to Install, Deploy & Use
  • Maximize Your Security, Minimize Your Risk
  • Disk Partition and file volume encryption
  • Invisible Containers
  • Hide data into music files
  • Easily encrypts Pen-Drives and USB disks on a container or partition level.
  • Improved Password Security
  • Password Sniffing Protection
  • No-Evidence Encryption
  • Administrator Password Control (keyfiles)
  • Anti Dictionary or Brute Force Attack mechanism
  • Easy and fast hotkey control
  • Second User Access
  • Forgotten user password recovery
  • Eliminate the Danger Of Unattended Computers
  • Secure Disk Deletion (Disk Wiping)
  • Encrypted Volume Resizing
  • External Hardware Support
  • Works on any Storage Medium
  • Installation is Easy and Safe
  • Encrypted Data is Easily Recovered
  • No Backdoors present

 

1. Strong Cryptography

1344 Bit Military Strength disk encryption using the best and most proven cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des, Triple Des, Misty 1 and Square.

2. Easy to Install, Deploy & Use

Our data encryption software requires minimal administration and user training. Disk encryption is completely transparent, requiring no change in the way users work with the computer.

3. Maximize Your Security, Minimize Your Risk

Disk encryption software protects your data with very fast and a true "on the fly" disk encryption process. Other products that claim to be "on the fly" decrypt an entire file and load it into memory, creating significant security risks.  The file encryption software is smarter and more secure because it decrypts only the specific portion of a file that is in use. Unprotected data never resides on a software encrypted hard drive.

4. Disk Partition and file volume encryption

Our disk encryption software allows both, the encryption of an entire Hard Disk partition, as well as the creation of a virtual container file that will store all the encrypted information.

5. Invisible Containers

The disk encryption software has the ability to create an INVISIBLE disk INSIDE a container or partition. This way you define two passwords for a container. The invisible disks password gives you access to your working disk, which is hidden in the unused area of your "outer" disk, while another password gives you access to the pre-setup encrypted volume in which you only store data that you would want others to believe is the only data in the container or partition. This is very useful in cases where an aggressor may force you to reveal the encrypted disk's password: By revealing the password of the first or "outer" disk, the aggressor will ONLY see the "prepared data": IE data you put in there, before creating the hidden disk, while he will not be able to see or get evidence that there is another invisible container that securely stores confidential data on the disk.

6. Hide data into music files

Using special so called "Steganographic" functionalities, our disk encryption software allows you to hide all your sensitive information into music files. Just authorized users will be able to access secret information, anyone else will only find harmless music on the computer.

7. Easily encrypts Pen-Drives and USB disks on a container or partition level.

With the HOT Disk option, the encryption software can also optionally automatically request the users authentication data as soon as the USB device is inserted. When the USB disk is removed from the computer, all the data are automatically inaccessible to unauthorized persons.

8. Improved Password Security

The disk encryption software allows administrators to configure several password settings:

  • Master Password Settings
  • Restricted second user Passwords
  • Second user Password Expiration
  • Console Lock-Out Password

9. Password Sniffing Protection

The encryption software integrates special functionalities that prevent passwords from being sniffed by Hackers or Trojan horses such as Back Orifice, SubSeven etc...

10. No-Evidence Encryption

The encryption container files do not have any file header that indicates it is an encrypted file. Therefore, without knowing the right passphrase, it is impossible to prove that a large container file on the computer is an encrypted virtual disk container.

11. Administrator Password Control

Disk encryption software allows system Administrators to assign different passwords to different users.

12. Anti Dictionary or Brute Force Attack mechanism

Disk encryption software makes Dictionary or Brute Force attacks against encrypted volumes much harder than any of the actual competitor products by dramatically slowing down these processes.

13. Easy and fast hotkey control

Disk encryption software allows the most used commands like mount or dismount encrypted volumes… to be rapidly accessed trough Hotkeys and/or the toolbar.

14. Second User Access

Disk encryption software  allows the creation of a master password, as well as different lower rights second user passwords (keyfiles).

15. Forgotten user password recovery

Disk encryption software  allows administrators using the master password, to access an encrypted disk even if the user has forgotten his user password. This ensures that a company can restore a user password if forgotten. The encryption software prevents loss of valuable data from user's workstations and notebooks by allowing three methods of encrypted data access: the Master Password, the user password (keyfile) and/or hardware device access such as optional fingerprint-/Smartcard Readers or USB Token devices.

16. Eliminate the Danger Of Unattended Computers

Disk encryption software  provides an automatic and/or manual lock-out feature that locks out the user's console and displays a password-protected screen saver. This lock-out functionality can be activated manually or automatically after a specified period of computer inactivity. The computer remains secure even when left unattended. To restore the screen and unlock the keyboard, the password for the current user or Master Password must be entered.

17. Secure Disk Deletion (Disk Wiping)

Disk encryption software  allows you to wipe the free space on a disk. This ensures that deleted files will never be recovered by special disk tools.

18. Encrypted Volume Resizing

An Encrypted Volume may, with time, become too small or too big, for the amount of data it has to contain. Therefore, the disk encryption software offers you a Volume-Resize functionality. This will allow you to easily adapt a volume to your needs at any time, and optimize the Hard Disk space.

19. External Hardware Support

Disk encryption software  supports optional external hardware devices such as: Fingerprint and Smartcard reader, as well as USB token.

20. Works on any Storage Medium

Disk encryption software  works on any kind of Hard Disk, and removable medium such as Floppy-, Zip-, Jazz-, Sygate-, CD-Rom, DVD- Drives etc… and manages up to 16 TERABYTE of encrypted data (Standard edition) or 4 GB (Home Edition)

21. Installation is Easy and Safe

The installation is easy and fast. During installation, the administrator simply selects the drives to be encrypted, the encryption method he would like to use and the master password. The encryption software will then make the rest and crypt the selected disks.

22. Encrypted Data is Easily Recovered

If a user leaves the organization, the encrypted data on the PC is easily recovered and restored to a decrypted state by the administrator using the Master Password or the Local Administrator Password.

23. No Backdoors present

Disk encryption software  does NOT include any backdoor. Encrypted data are only accessible by the legitimate users. Neither the vendor nor any other entities are able to break software disk encryption.

About UsProductsSolutionsPartnersTerms of UsePrivacy PolicyContact Us

Copyright © 2003 - 2011 Earlyon Technologies Ltd. All rights reserved.