Data Security Software can track and recover stolen files.
November 19, 2010 -
Designed to protect computer data and assets, CyberAngel® Security Software provides single and 2-factor authentication as well as file/folder level encryption, which can encrypt information across multiple drives utilizing AES encryption algorithms. Secure Port Lock locks all USB, COM, and Firewire ports upon violation, preventing unauthorized information transfer. When CyberAngel® Secure Authentication is breached, alert is transmitted to Security Monitoring Center for tracking and recovery.
Original Press release
CyberAngel Security Solutions, Inc.
475 Metroplex Drive
Nashville, TN, 37211
Announcing the Latest Release of The CyberAngel® Security Software
NASHVILLE, Tenn., -- CyberAngel Security Solutions, Inc. is proud to announce the release of our newest version of The CyberAngel® Security Software. CyberAngel Security Solutions, Inc. has made it standard practice to provide innovative custom security solutions for corporate and consumer markets for the past 14 years.
The CyberAngel Security Software blends Authentication, Data Encryption, File Transfer Prevention, as well as Tracking and Recovery in the event of theft to provide a strong tool to use in the protection of your computer data and assets. With our latest version, we have enhanced several of the feature sets of our CyberAngel® product to provide a smoother implementation, stronger data encryption, new data transfer protection, and enhanced tracking and recovery capabilities.
The CyberAngel® Security Software provides:
Single & Two-Factor Authentication modes available.
Secure Data Encryption
File / Folder level encryption allows for more flexibility in data protection and has the ability to encrypt information across multiple drives, utilizing industry standard AES encryption algorithms.
Secure Port Lock
Locks all USB, COM and Fire wire ports upon violation, preventing any unauthorized information transfer from that machine, by portable media or through a dial-up connection.
Tracking & Recovery
When The CyberAngel® Secure Authentication is breached at login or boot-up, The CyberAngel® Security Software's patented technology silently transmits an alert to our Security Monitoring Center, where we identify the location from which that computer is calling. Our Recovery Team helps coordinate notice to all necessary law enforcement officials and works closely with them to provide a rapid recovery of your stolen computer.
Enhanced Communication Protocols
When a computer is flagged as stolen, alarm transmission parameters such as frequency and information passed can be changed to provide more detailed tracking information to provide to Law Enforcement to assist with recovery.
Product feature and / or version updates are automatically pushed out to the end users to ensure best possible protection.
Broad Platform Support
Works on Windows® 7, Vista, XP, NetBooks and Windows® for Tablets in both 32 and 64 bit formats.
With the market today in excess of 100 million portable computing devices, and a proven 14 year track record, The CyberAngel® Security Software is the best possible way to protect and locate stolen assets. Are you CyberAngel Secure?
About CyberAngel® Security Solutions, Inc.:
CyberAngel® Security Solutions, Inc. (CSS, Inc.) has been providing The CyberAngel® Security Software since 1996, and is considered an industry pioneer. The company is a leader in Data & Information Security, Intrusion Detection, and PC Tracking & Recovery.
More information: http://www.thecyberangel.com.
CONTACT: Bradley Lide of CyberAngel Security Solutions, Inc., 1-800-510-4344, firstname.lastname@example.org
Web Site: http://www.thecyberangel.com