Cryptainer™ Features
Top  Previous  Next

bullet Powerful, on-the-fly (drag-and-drop) encryption  
You can use Cryptainer like you use Windows Explorer. This 'encrypted - container' functions like any other drive you use everyday, like your C: or D: drives. The mere act of dragging the file into Cryptainer encrypts it, and dragging it out decrypts it. A Cryptainer volume is created within your hard-drive, which can be viewed, accessed, browsed and modified only by the user who has the key or password to open it.  
 
bullet The Ghost Drive!  
When you start Cryptainer, the drive will appear in your "My Computer" folder within Windows Explorer. You can even view it through your MS-DOS prompt. When you shutdown and exit Cryptainer your Cryptainer ghost drive disappears. Hence, the fact that you might have encrypted data onto your machine is also hidden from everyone but you.  
 
bullet Easy Operation  
Once the virtual drive is loaded, you can copy, move, delete and drag and drop files just as you would with any other hard disk. Once unloaded, with a single click, your data gets encrypted.  
 
bullet Standard Windows Functions  
Cut, copy, paste, new file/folder creation, etc., can be used within the encrypted drive.  
 
bullet Real Time File and Folder Protection  
Cryptainer's high-security "On the Fly" disk encryption technology ensures that your data is safe at all times. Simply drag and drop to encrypt.  
 
bullet Secure Email  
The Secure e-mail module allows for the creation of self extracting encrypted files. The recipient need not have Cryptainer installed to decrypt the files, all that is required is the password. This allows for a totally secure communication system that makes use of existing generic e-mail clients on a public network, yet allows for totally secure data transfer.  
              
bullet No Back Doors  
No access to your ghost drive is possible under any circumstances by any organization or individual. If you do not remember your password, you cannot view the encrypted documents on the Cryptainer drive. There is no special procedure, secret code or hidden entry method to access and view your sensitive data.  
 
(If this is a concern, we recommend that you deploy CryptainerSE instead. This is a corporate version, created with these ("lost" "forgotten" passwords) and other such related contingencies  
events in mind).  
 
bullet No Format limitations  
Cryptainer encrypts every kind of file format, whether it is textual, tabular, graphical, organized in a database, audio or video.  
 
bullet Fast Encryption  
Cryptainer is fast! You will barely notice the difference in speed as compared to a regular copy – paste function.  
 
bullet Customized, easy–to–remember password possible  
The length of your password / phrase can be an alphanumeric combination of up to 100 characters; hence you can use longer phrases that are easier to remember, as your password.  
 
bullet Storage Flexibility  
Cryptainer can create volume files on removable media. This allows for the flexibility to store and port data on removable media like Zip disks, tape drives.  
 
bullet Windows Compatibility  
Cryptainer works with most supported 32 bit versions of Microsoft Windows including Windows 95/98/ME/2000/XP as well as MS Windows supported file systems like FAT, FAT12, FAT32, NTFS, NTFS with EFS, etc.  
 
bullet One Step Encrypted Data Back-Ups  
Worrying about storing sensitive information on backup media is a thing of the past with Cryptainer. Taking encrypted backups of Cryptainer volumes is a one step process, as easy as "Drag and Drop". A 650 Mb volume is perfect to store all data and take encrypted backups on a CD (Cryptainer PE and Cryptainer 7.1 only)  
 
bullet Implement Effective Access Control In A Multi User Environment  
With Windows, it is almost impossible to segregate user data in a multi user environment. without substantive security and privacy concerns. With Cryptainer, different users can have different Cryptainer volumes. This way information is segregated easily.