Cypherix™ - Borderless Strong Encryption Cypherix® Encryption Software - Japanese Cypherix® Encryption Software - Chinese Cypherix® Encryption Software - Spanish Cypherix® Encryption Software - Italian Cypherix® Encryption Software - Dutch Cypherix® Encryption Software - German Cypherix® Encryption Software - French Cypherix® Encryption Software - English  
 


btsoftware.com
Title: SecureIT

Reviewer: btsoftware.com

Date: March 2006

Original URL: Not Available

Description: 
Encryption made easy - Designed to hide the complexities of encryption. Encryption made as easy as ABC.Command Line Processing: Powerful command line processing.Secure e-mail module - Allows for the creation of self extracting encrypted files. The recipient need not have SecureIT 2000 installed to decrypt the files, all that is required is the password. This allows for a totally secure communication system that makes use of existing generic e-mail clients on a public network, yet allows for totally secure data transfer.Intuitive interface - To minimize the learning curve, and make the product easy to use. Open source secure algorithm - SecureIT 2000 uses a non-proprietary, open source, public domain encryption algorithm, Blowfish, at a key strength of 448 bits. Blowfish is one of the strongest cryptographic algorithms in existence.Total security - Statistically impregnable against brute force attacks. It would take more than the age of the universe for all the computers in the world working simultaneously to decipher a SecureIT 2000 encrypted file. Fast encryption - SecureIT 2000 is fast, and requires relatively few computing resources and little time to encrypt files. In practical terms, a 1 MB file can be encrypted in a second or two on most desktop machines.Built in file shredder - When files are deleted within the standard computing environment, they are not completely removed from the hard disk. Only the file information is removed from the File Allocation Table. There are several commercially available software packages that can then be used to 'undelete' or recover data. This can lead to serious breaches of security. SecureIT 2000 has an integrated file shredder module that removes all traces of data.No "back doors" - No unauthorized access to encrypted data is possible under any circumstances. There is no special procedure, secret code, or hidden entry method to fall back on. Encrypts all data - SecureIT 2000 encrypts files from any application, whether spreadsheet, graphics, word processing or any other; on every kind of re-writable media, whether floppy disk, removable hard drive, zip drive, tape drive or other.





Click on the button to download a FREE, fully functional copy of Cryptainer LE.


Copyright © 1999-2016 Cypherix™. All rights reserved.
Privacy Policy  |  Sitemap   |  Contact Us