Encryption Software Service Edition with Scheduling (for Windows): runs scheduled encryption, decryption sessions as a service process. Uses the latest industry standard strong encryption algorithms (AES known as Rijndael, Twofish, RSA,..).
High Power Encryption software protects all proprietary data on PC 100% of the time without users having to think about security. Any user, from individuals to enterprises, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and more with this product.
Reflection for Secure IT is an SSH-based security solution built for UNIX, Windows, and z/OS environments. By replacing nonsecure Telnet and FTP with Reflection for Secure IT, you can safeguard private data, shore up network defenses, and meet increasingly stringent regulatory requirements with confidence.
Reflection for Secure IT lets you: Secure remote administration of critical servers, even over untrusted networks; Safely transmit sensitive data and ensure that transfers are completed; Access any TCP/IP-based application through a secure transmission tunnel.
An optimized implementation of hash and checksum algorithms: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD(128,160,256,320), PANAMA, TIGER, CRC-32, CRC-16, CRC-CCITT, ADLER32. The library allows to calculate hashes (message digests), checksums and HMACs for files, memory blocks, strings, blobs, streaming data. It supports 3 interfaces: QuickHash API, C++ Interface and QuickHash Type Library.
Encryption application that supports encrypted logical drives for Windows XP/2000/NT and Windows ME/95/98 computers. It protects sensitive data on personal computers, notebooks, and removable media and works with all kinds of media, including network-accessible disks. Tiasoft Secured Drive works transparently with other applications.
SecEx is a network file manager and secure terminal emulator that allows encrypted file transfer between your PC and network servers running Secure Shell. SecEx interoperates with either SSH1 or SSH2 servers on both Unix and Windows operating systems. You can transfer files to and from remote servers, view remote files, and execute remote files on your local PC - using encryption. SecEx automatically detects available carrier protocols available on server systems. Newer SSH servers tend to make SFTP (Secure FTP) available while older secure shell implementations feature SCP ( Secure Copy Program). SecEx also shields against IP and DNS spoofing by recording a server's public host key. During subsequent connection attempts, the known host key is compared to the host key offered by the server.
Bandwidth Splitter is a program extension for Microsoft ISA Server that supplements it with new features to allow more rational sharing of the existing Internet connection bandwidth and distributing it among all users and servers according to preset rules. Fearures include: traffic shaping, traffic quoting, and detailed real-time monitoring.
With BestCrypt you can allocate a portion of free space on your hard drive where you keep all your sensitive data in encrypted form, creating a virtual drive in your system that you work with as you would any other drive. BestCrypt uses strong encryption algorithms, including Blowfish, GOST, and DES. Features include a time-out option, hot keys, a wiping utility, and the ability to add your own encryption algorithm. Windows NT/2000/XP are supported.
HOBLink Secure, the complete, platform-independent package for secure communication and authentication in TCP/IP networks, has been awarded the German IT Security Certificate. After a thorough examination process by an accredited and licensed evaluation facility, the German Federal Office for Information Security has awarded HOBLink Secure this certificate, confirming HOBLink Secure's conformance to the Common Criteria for IT Security Evaluation.
Based on Secure Socket Layer, V.3 (SSL3) and Transport Layer Security (TLS), HOBLink Secure employs the latest technology in creating and managing certificates and encryption keys.