About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Press Releases
Dekart releases version 2.01 of its disk encryption software Dekart Private Disk
Tuesday, 16 March 2004 16:11 EST

March, 16 - Dekart (www.dekart.com) today announced the release of a new version of Dekart Private Disk, a reliable and secure disk encryption software using AES encryption to protect user data. Dekart Private Disk v. 2.01, an enhanced version of the original software program, contains an easy-to-use user guide, offers an increased reliability, as well as other customer-suggested enhancements.

Dekart Private Disk is an easy-to-use, fast and affordable software program that allows individuals to quickly encrypt both personal and business documents, as well as any other types of files stored most types of storage media. Dekart Private Disk allows to 100% protect the privacy of the important data, ensuring that only the owner of the documents will get access to the protected data in accordance with the defined user privileges.

Dekart Private Disk is the top solution for people with no particular knowledge in encryption or cryptographic technologies. The user friendliness of the program enables users to protect their private data without even thinking about security. Dekart Private Disk can now suit the needs of an extremely wide range of people, designed to solve the problem of an increased worry about private documents, emails, business agreements, personal letters, tax returns or receipts, bank accounts or any other sensitive information.

Dekart Private Disk boasts an impressive positive experience in large and medium-sized enterprise deployment, eliminating enterprise security risks and providing an increased flexibility for administrators defining access policies. Dekart Private Disk can be used to transmit confidential data to any other Windows user, provided that he knows the decryption password, to back up and securely store data, or to share protected files on removable media or on the network.

Benefits of Dekart Private Disk 2.01 include the following:

* Easy to Install/Use: The program is installed and configured in minutes.
* Powerful Data Protection: The software uses the 128-bit AES algorithm to protect data files.
* Data Portability: Dekart Private Disk allows to securely transmit data using any external storage device, ensuring that no information will be stolen.
* Intuitive User Interface: Dekart Private Disk integrates into your work process, seamlessly protecting your data.
* Cost-effectiveness: Dekart Private Disk is a cost-effective solution for creating secure workspace requiring no change in the way users work with the computer.

About Dekart Private Disk

Dekart Private Disk is an easy-to-use, secure and reliable disk encryption software. Provides 100% protection of your private information, making your important files invisible and protected from unauthorized access. Creates one or more virtual encrypted disks on your hard drive or external storage device like FDD, CD, CD-R, CD-RW, DVD, MO, MD, ZIP, flash drives, all types of flash memory cards. Dekart Private Disk encryption algorithm has achieved US government validations as corresponding to Advanced Encryption Standard (AES) and Secure Hash Standard (SHA-1). For detailed information and additional new features of Dekart Private Disk, please take a look at:
http://www.dekart.com/products/file_disk_encryption/private_disk/.

About Dekart

Dekart, committed to securing enterprise digital assets and protecting sensitive information of individuals, provides cost-effective, easy to deploy solutions that combine password, USB tokens or smart cards and biometric security. Dekart security solutions enable enterprises to reduce risk of unauthorized access and protect users from losing their personal information. More about Dekart can be found at www.dekart.com



Featured Articles

Software application development has only been around since the late 1970s. Compared to other industries and professions, the software industry is still very young. Ever since organizations began to use computers to support their business tasks, the people who create and maintain those “systems” have become more and more sophisticated and specialized.

A new Trojan horse is designed to produce forge Google ads that are formatted to look like legitimate ones. The Trojan attempts to incorporate its ads in Google AdSense publishers program. Once installed, the Trojan horse downloads itself onto the computer and replaces the original ads with its own ads.

According to Burton Group, identity federation can be defined as ‘the agreements, standards and technologies that make identity and entitlements portable’. There are three main federation models - simple (point-to-point), hub and spoke (uni or bi-lateral) and circle of trust (many-to-many).

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Phishing By The Numbers: 41,000 Blocked Sites in 2005
Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter