Encryption Systems

Encrypted Email Service offers enterprise-wide protection.

Featuring 24x7 management and maintenance, end-to-end policy-driven Encrypted Email Service requires no hardware or software by SMBs to ensure appropriate handling of confidential information and provide audit trail. Service lets companies specify central policies for handling sensitive email and automatically encrypts content accordingly. Along with email blocking and escalation, service offers...

Read More »

Software delivers full disk encryption capabilities.

PGPÂ-® Whole Disk Encryption offers multi-layer defense against laptop, desktop, and server data loss by combining 4 disk encryption solutions. Products are available as part of PGP Universal deploy-once encryption platform, including central policy, key management, deployment, passphrase recovery, and LDAP integration. Solution handles data encryption when stored or backed-up on external...

Read More »

Messaging Server offers secure boundary email encryption.

Appliance-based Entrust Entelligence(TM) Messaging Server v8.0 enables email encryption using most acceptable supported method for communications to internal or external business partners, suppliers, or customers. Standards-based solution supports protocols such as OpenPGP, S/MIME, and AdobeÂ-® PDF. It can provide desktop encryption, boundary email encryption, or combination of both.

Read More »

Appliance optimizes security of standard tape library.

Tape Library Accelerator Appliance allows users to deploy backup acceleration and data encryption services in backup environment without changing configuration of physical tape library or 3rd party backup software. It utilizes disk to provision additional virtual tape drives to backup host, and encrypt physical tape cartridge in background without impacting backup speed. Password-protected...

Read More »

Cryptographic Coprocessor delivers security-rich solution.

Designed to support cryptographic functions for PCI-X bus xSeries 226 server, 4764 Model 001 PCI-X Cryptographic Coprocessor provides tamper-resistant and tamper-responding hardware that meets FIPS 140-2 Level 4 certification. Coprocessor delivers RSA algorithm-based digital signature generation and verification with keys up to 2,048 bits in length. It also provides SHA-1 hashing, triple- and...

Read More »

Coprocessor Adapter enables secure Internet transactions.

PCI Cryptographic Coprocessor Adapter provides hardware engine for Internet transactions including secure data exchange, verification, electronic signatures, and bulk data encryption and decryption. Cryptographic processes are performed within tamper-resistant enclosure on adapter, which meets FIPS PUB 140-1 standard for commercial cryptographic devices at Level 3.

Read More »

Security Appliance integrates with backup applications.

CryptoStor(TM) Tape 700 helps organizations achieve information privacy and regulatory compliance by dynamically compressing, encrypting, and digitally signing data as it is written to tape libraries or virtual tape systems. Global key management support ensures tape recovery from any location without sacrificing information security. Hardware appliance offers FIPS 140-2 Level 3 certification in...

Read More »
Hardware-Based Encryption Device prevents computer break-ins.

Hardware-Based Encryption Device prevents computer break-ins.

Kanguru Encryptor utilizes silicon-based, real-time encryption/decryption processor that encrypts entire disk's content bit-by-bit, including boot sector and operating system. Available in 40-bit DES or 128-bit TDES encryption, unit fits in 5.25 in. bay, works with all operating systems, and does not require device driver. Encryptor includes 2 access keys for authentication and encryption...

Read More »
Serial Development Kit has universal reader/writer.

Serial Development Kit has universal reader/writer.

Kit includes 6 keys or tokens containing 2 Microwire(TM), 2 IÂ-²C, and 2 SPI memories, 2 KeyceptaclesÂ-® or Receptacles, KeyLink(TM) II or SlimLink(TM) II reader/writer, connecting cable, and power supply. Software CD includes read/write/erase capabilities that assist in developing key and token integration software utilizing RS-232 serial or USB interface that allows users to program key...

Read More »
Serial Memory Key has unique identifier.

Serial Memory Key has unique identifier.

With IÂ-²C(TM) interface, IIK series electronic memory key has EEPROM with unique 48-bit register that cannot be changed by user. Series includes light-duty, 1 and 2 Kb data carriers that provide data storage and transfer for end-user applications. Product offers solid molded construction with wear-resistant exterior, which protects embedded memory chip from physical damage and harsh...

Read More »

All Topics