Secret Disk by Aladdin R.D.: Preventing Information Leaks
Confidential and important corporate information will be reliably protected by the Secret Disk software package from Aladdin R.D., a leading Russian developer and supplier of information security solutions. This specialized solution is designed to prevent any leaks of confidential data.
let's focus on the most important ones.
Fully encrypted system partition (FDE): to boot the computer, you must pass mandatory two-factor authentication, which an attacker cannot do. Physical access to the disk with the system partition does not increase the risks, because the information on it is also reliably protected by the encryption method. At the same time, the operation of the security system does not impose any restrictions on the authorized user and is completely transparent to him.
Encryption of folders and files, which allows you to belize mobile database a separate protected area for storing and processing confidential information. Access to such information is possible only for an authorized user. Other users, including the IT administrator, will not have access to encrypted data. Thus, the problem of separating work and personal areas on a home computer is solved without additional complications.
Control over the use of USB drives , which allows only authorized users to copy protected (and therefore important/confidential) information. When copying, all information that gets to the USB drive will be encrypted, and only an authorized user and only on a specific workstation will be able to read it. An enterprise with such an opportunity will not have to give up using flash drives, since its information will always be reliably protected.
Cryptocontainers are a function that allows you to place one or more files in a special protected file container and transfer it to another employee or counterparty via e-mail or through any public service. The exchange will be carried out without the risk of compromising confidential data in the event of interception of the container during transmission. This method does not require the mandatory use of Secret Disk on the recipient's computer; it is enough to install a compact utility and receive a password to the container from the sender.
Secret Disk has a wide range of functionality
-
- Posts: 549
- Joined: Mon Dec 23, 2024 3:15 am