Cypherix® Solutions are Compliant with OMB standards and protocols. Cypherix® solutions provide encryption for hard drives as well as files and folders stored on windows servers, laptops, desktops, removable media and mobile devices, thus enabling our customers to address area SC-13 of the special publication.
All modules are based on a secure implementation of the blowfish strong encryption algorithm at key strength of 448 bit. The Cryptainer SE based solution has the following primary security features:
It is our belief that it is crucial to the adaptation of any security scheme that there be no deviation in the end user's patterns of normal computing. With this in mind, the end user components in the scheme have been specially designed to ensure maximum utility and simplicity of use.
Cryptainer offers true on-the-fly disk encryption to ensure that absolutely anyone can use it effectively. No more password protecting files one at a time. No more deleting documents manually after encrypting them.
Cryptainer SE protects your data by creating multiple encrypted vaults for all your files and folders. Encrypted containers appear as standard hard disk partition to the OS and all applications. Using Cryptainer you can encrypt any type of data/file format, whether it is textual, tabular, graphical, organized in a database, audio or video. Just drag, drop and unload to encrypt. What you get is foolproof, hassle-free, unbreakable security.
Cryptainer SE works with all 32 bit versions of Microsoft Windows (Windows 95, Windows 98, Windows ME, Windows 2000, Windows 2003 Server, Windows XP, Windows Vista, Windows 7, Windows 8). It encrypts on all file systems such as FAT, FAT12, FAT32, NTFS or NTFS with EFS.
Cryptainer SE's mobile feature allows to create a 'stand-alone' install of Cryptainer on USB/removable drives and mobile devices.
Powerful command line processing available for encrypting/decrypting at the dos prompt. Group a series of encryption and decryption commands in a single or multiple batch files.
Corporate users can maintain control, despite individual end users’ freedom to set independent passwords, without administrative intervention. In case an employee leaves or inadvertently encrypts vital data, it is possible for the corporation to recover such data, if they so deem necessary.
The Cryptainer Administrative Module provides corporate users with single point control and monitoring of the distributed security system without introducing any of the weaknesses inherent in the underlying operating systems. This ensures the integrity of your data, and at the same time gives you flexibility and overall control. You have the freedom to implement your company security policies without changing any underlying software.