Technology News  |   Industry News  |   Product News  |   Business News  |   Event News  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |
  Corporate & Office  |   Education & Institutional  |   Financial  |   Game & Casino  |   Government & Public  |   Homeland Security  |   Hospital & Entertainment  |   IT Asset & Technology  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |   Consulting & Services  |
  Edit Member Profile  |  Edit Company Profile  |  Change Password  |  My Resources Profiles  
  2009 MAR Issue   |   What is Digital Magazine?  |  How to use  |  Archives  |    
 
  SecurityWorldMag.com

SecurityWorld Online Magazine

Corporate & Office

Education & Institutional

Financial

Game & Casino

Government & Public

Homeland Security

Hospital & Entertainment

IT Asset & Technology

Manufacturing & Industrial

Retail & Transportation

Residential

Home > Market >

SecurStar presents next-generation IT security solutions

In the past few years, the IT security area at the CeBIT has expanded considerably. Not only has the number of presenters grown, but visiting professionals are increasingly interested in the products and solutions in this segment. And again this year, this area will be given especially high priority at the CeBIT. SecurStar GmbH, an IT security specialist, will also be presenting their range of solutions for the fields of computer security, hard disk encryption software and mobile security in Hall 6, booth G51.

These professional products based on proprietary technology can be used in a variety of areas to meet all security requirements. Whether for desktop PCs, laptops or other mobile devices, SecurStar offers end users and companies easy-to-use solutions for protecting both the private sphere and all sensitive data.

DriveCrypt family: Hard disk encryption for PCs and laptops

DriveCrypt software secures all confidential data on laptops and desktop computers at any time. With features such as the encryption of entire hard disk partitions or the generation of virtual containers for storing encrypted data, hackers do not stand a chance. One highlight is also the option of using steganography to hide data in WAVE files. Secure data can be opened with a password, a USB token, smartcard or fingerprint scanner. DriveCrypt PlusPack offers a full encryption of the hard disk (including the operating system) and ensures data security with military-strength AES 256-bit encryption. The entire operating system can be hidden in the free memory of another. With the central SecurStar management console, companies can also easily manage large networks and encrypt laptops and computers.

Unauthorized network access: No chance with ShareCrypt

ShareCrypt enables effective encryption of drives and folders in public networks and allows simultaneous access to the data on the hard disk by different users using passwords. Unauthorized access by unauthorized persons is prohibited. Optionally, ShareCrypt prevents administrators from reading confidential information. Any sensitive data that the user of a client saves on a public drive remains encrypted for the entire duration of the session. Nevertheless, administrators are still able to make all necessary security backups. ShareCrypt is a client-based solution that is installed on the computer from which the data is to be accessed. The server is unaffected. The solution is completely scalable and permits the generation and management of not only a large number of encrypted hard disks but also of folders of unlimited size.

Acting anonymously on the Internet: with SecurWall and SurfSolo

The SecurWall personal firewall offers effective all-round protection for PCs and distinguishes itself with its simple administration. It protects from Trojans, spyware, worms, and many other security risks. This provides the user with the highest degree of privacy and anonymity, since the Internet connection is encrypted and the IP address is changed. Any attempts by hackers to locate the user are destined to fail. With SurfSolo, SecurStart offers this solution as a stand-alone solution to enable anonymous use of the Internet. Hacker attacks can be prevented and the user cannot be identified or surveilled since he is using different online identity. SurfSolo functions like a secure VPN but is especially designed for private use. The solution is easy to use and the user notices nothing as it runs in the background.

PhoneCrypt: Encryption solution for tap-proof mobile communication

The PhoneCrypt encryption solution was developed for protection against tapping and monitoring attempts. It also protects confidential mobile phone conversations at a level that corresponds to military security standards. This is a pure software solution intended for communicators and smart phones that are Microsoft Windows Mobile-enabled, which allows encrypted two-party conversations in real time, thereby effectively excluding any possible call tapping by third parties. PhoneCrypt encrypts telephone conversations in both directions "end-to-end" and also distinguishes itself by protecting the Windows operating system on the mobile telephone from the risks of cell phone Trojans and other weaknesses as well allowing text message encryption.

 

 

 

For more information, please send your e-mails to swm@infothe.com.

¨Ï2007 www.SecurityWorldMag.com. All rights reserved.

 

 

 
 

     ioimage and EVT announce technology partnership

     Norbain cements relationship with Bosch



Wireless IP Cam...
Home Security S...
IP camera Netwo...
Home l New Product Showcase l Gold Suppliers l Trade Shows l email Newsletter l About SWM l Help l Site Map l Partnerships l Privacy Policy | Newsletter
Publisher: Choi Jung-sik | Edited by: Lee Sang-yul | Youth Protection Officer: Lee Sang-yul
Copyright Notice ¨Ï 2004-2007 www.SecurityWorldMag.com Corporation and its licensors. All rights reserved.