Steganos Security Suite 2006 released to increase privacy protection for UK PC users

Similar documents
Steganos Safe Professional th June 2007

Data Security Double Package Sexy & Fresh: The new Steganos Safe 11 and Steganos Privacy Suite 11 are out!

Seqrite Antivirus for Server

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

CleanMyPC User Guide

Quick Heal Total Security

ACRONIS TRUE IMAGE 11 HOME REVIEWER S GUIDE

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

McAfee Internet Security Suite Quick-Start Guide

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

What Storage Security Will Users Tolerate and What do they Need?

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+

PGP NetShare Quick Start Guide Version 10.2


Help & User Manual. Table of Contents. 1 Introduction of Safe-All. 2 Safe-All Installation. 3 Safe-All Login. 4 Safe-All Functions & Features

The best for everyday PC users

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

FAQ. Safe Anywhere PC 12. Disclaimer:

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 7

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Seqrite Endpoint Security

Lenovo Europe, Middle East, and Africa Hardware Announcement ZG , dated January 27, 2009

Built without compromise for users who want it all

Table of Contents. User Guide

The process by which a user can associate specific permissions to each username.

Microsoft Questions $ Answers

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document

ESET SMART SECURITY 10

About Lavasoft. Contact. Key Facts:

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

FOR macos. Quick Start Guide. Click here to download the most recent version of this document

Sophos Mobile Security

Free Utilities for Your Computer September 20, 2007

Security Awareness. Presented by OSU Institute of Technology

Mobile Computing Policy

Chapter 1: Introduction About the User Manual Intended Audience Conventions Used Revision History 4

Table of Contents. A. Introduction...2. B. General Description...2. C. Features...3. D. Before Using the Security Application Program LOCK...

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

F-Secure Mobile Security

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011

F-Secure Mobile Security

Lockngo Professional


Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

Microsoft Questions $ Answers

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

User Guide. Quick Heal Technologies Ltd.

PCI Compliance Updates

Defining Computers. Defining Computers. Understanding Essential Computer Concepts

Install and setup TrueCrypt

i-vault User Guide Comodo i- Vault User Guide Comodo

Online Threats. This include human using them!

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Use of this product is subject to acceptance of the Panda End User License Agreement enclosed. Panda Security TM. TruPrevent: registered in U.S.A. Pat

LabSim Mapping Matrix

Manually Remove Of Xp Internet Security Protect Virus Manually

Phishing Activity Trends Report August, 2005

Codebook. Codebook for OS X Introduction and Usage

Introduction to Information Security Dr. Rick Jerz

For this class we are going to create a file in Microsoft Word. Open Word on the desktop.

Kerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

stickapp anti-virus password manager vpn client free Security & Productivity Apps for SafeStick stickapps.co.uk

Product Brief. Circles of Trust.

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

PcZealous [Professional] User Manual

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

Course Outline (version 2)

Cyber Security Basics. Presented by Darrel Karbginsky

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center

A practical guide to IT security

An Agency Under MOSTI SECURITY ASSURANCE. Securing Our Cyberspace. Copyright 2008 CyberSecurity Malaysia

How To Remove Personal Antivirus Security Pro Virus Windows 8

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

Systems and Principles Unit Syllabus

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

A Review Paper on Network Security Attacks and Defences

CHAPTER 8 SECURING INFORMATION SYSTEMS

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

ESET NOD32 Antivirus 4. Product Briefing

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

Microsoft Questions $ Answers

19 - This PC Inside This PC

MIGRATING FROM WINDOWS XP

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product.

Kaspersky Mobile Security 9. Reviewer s Guide

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Transcription:

1 Steganos Security Suite 2006 released to increase privacy protection for UK PC users The latest version of the leading encryption software offers stronger encryption and more user-friendly decryption, defence against 100,000 malware programs, secure deletion of data and user behaviour traces, AntiTheft-technology that can help to recover stolen computers, a password manager and password-protected browser favourites. 11 October 2005 - Steganos, European leader in providing security and privacy software for consumers and SMEs, has launched Steganos Security Suite 2006. This latest version of the leading privacy protection suite includes the latest releases of Steganos Safe 8 and Steganos AntiSpyware 2006, as well as a raft of features exclusive to this suite. Highlights of the new software include: Support for 256 bit encryption using the never-cracked AES algorithm USB-sticks, mobile phones or digital cameras can be used to unlock encrypted drives USB sticks can be used as rewriteable encrypted safes Steganos AntiTheft: gives a PC owner data on where their PC is being used so stolen machines can more easily be recovered Password-protection for browser favourites Integrated Internet Trace Destructor and Shredder Password Manager can now automatically enter passwords as well as storing them Automatic Crash Protection Free updates for a generation of the software Steganos Security Suite 2006 in detail Steganos Safe 8 With Steganos Safe 8, also available as standalone product, users can create an unlimited number of secure, encrypted virtual drives, each containing up to 64GB of data. The drives can be accessed directly from within applications, through Windows Explorer and through any internet browser. Safe 8 uses the long-established but never cracked international encryption standard AES (Advanced Encryption Standard). Previous versions of Steganos Safe employed 128-bit AES. Now using 256 bit keys, Safe 8 provides a level of encryption that is considered by the US National Security Agency to be of a high enough standard to protect its data classified as top secret.

2 Drives can be unlocked using USB keys, storage cards, digital cameras or even wirelessly using ActiveSync-compatible mobile telephones and Bluetooth. The secure data is automatically unlocked when the device is connected and is automatically locked when the device is removed again. USB keys can now be used as rewritable mobile safes: Data can be added from any PC when the key is removed all data is securely encrypted. Encrypted archives can be burned to CD, DVD, and the 8.5GB capacity DVD-DL disks. The content of the encrypted storage can be opened on any PC without additional software. Steganos File Manager and email encryption Steganos Security Suite 2006 encrypts and hides sensitive data invisibly in image and sound files so that they don t attract attention. Users can encrypt individual files or whole drives and even emails can be encrypted for sending. The self-decrypting emails can be opened on receipt without any additional software. Steganos AntiSpyware 2006 Steganos AntiSpyware, also available as standalone product, is included in the Steganos Security Suite for the first time. Steganos AntiSpyware erects a defence against identity theft and will help computer users to protect their hardware, software and data from malicious programs and hackers. Steganos AntiSpyware 2006 now destroys over 100,000 malware programs and has been optimised to run up to 400% faster than the previous version. The software offers realtime protection and prevents personal data being sent over the internet, browser favourites being manipulated, the start page being hijacked and search requests being diverted. The application comes with a year of fully automated free updates. The programs identified and fully destroyed by AntiSpyware include: Keyloggers - which monitor keypresses and help hackers to steal passwords; Remote access trojans which hackers can use to control computers remotely; Denial of service agents which can be used to initiate attacks against websites and internet connections, thereby damaging the user s connection availability. Steganos AntiSpyware complements firewalls and antivirus programs which do not seek out these threats. Steganos Shredder

3 To ensure data is securely deleted, Steganos Security Suite includes Steganos Shredder. This provides three methods of destroying unwanted data: simple overwriting, the technology of the US Department of Defense DoD5220.22-M/NISPOM 8-306 and the Gutmann method with 35 rounds of overwriting. The deep cleaning shredder can eliminate any remains from files previously deleted using other means, ensuring that there is no data on the disk s free space which can be reconstituted. This is especially important if a computer is being sold on the second hand market. Internet Trace Destructor The integrated Steganos Internet Trace Destructor 2006 now destroys over 200 surf and work traces. With a mouse click, users can delete history traces from browsers (now including Firefox), AIM and other messengers, Google Toolbar and Desktop Search, Media Player, and search requests on peer to peer networks. Data can be deleted on request or automatically after surfing. In the latest version it is also possible for traces to be discreetly deleted in the background without on-screen notifications. With a click, users can select different trace groups, such as Windows or browser traces. This enables files that consume excessive space or threaten the user s privacy to be chosen for removal. Users can store their trace deletion preferences. Steganos Password Manager Steganos Password Manager enables users to store and manage their passwords, including automated entry of user name and password at password-protected websites: the user only has to remember the password for the Password Manager. It can also create secure passwords automatically by extrapolating random codes from mouse movements. The user just chooses how many characters the password should have and whether numbers or special characters should be used. Private Favorites The user s favourite Web sites remain private: The list of favorites is password-protected. Steganos AntiTheft By using Steganos AntiTheft, computer owners can increase the likelihood of recovering their computer should it be stolen. When the program is activated, the computer is given

4 an ID and regularly communicates with the Steganos Server. Should a computer be stolen, the owner can log in at the Steganos website to see the IP addresses of that computer s connections to the internet in the last 30 days. With the assistance of the appropriate internet service providers, this data can be used to identify where the computer was connected to the internet and whose internet access account was used to connect it. System requirements Windows 2000, Windows XP Home Edition, Windows XP Professional Internet access 27MB free disk space for installation Minimum screen resolution of 800x600; at least high colour (16 Bit) At least 40MB free memory, 60MB free memory recommended At least Pentium or comparable processor Mouse or other pointing device Requirements for Steganos Safe8: Additional hard disk space is required for secure storage. The NFTS file system is required for the full use of 64GB secure drives. With the FAT32 file system, drives have a maximum possible size of 4GB. For the portable safe, a CD or DVD burner with corresponding software is required. Up to 8.5GB is required as temporary storage space for optimal use. The use of Steganos Portable Safes on computers without Steganos Safe8 installed requires administrator rights. Supported devices: ActiveSync-compatible devices (eg phones, PDAs); all devices that Windows recognises as a writeable storage device (eg USB keys, storage cards, digital cameras). Bluetooth must be supported by the computer and mobile phone for wireless unlocking to be supported. Storage devices and key devices are not supplied by Steganos. Availability Steganos Security Suite 2006 is available online at www.steganos.com now and the boxed version will be available 7 October 2005.

5 Price Download and boxed versions are 49.95. Users can upgrade from the previous version of Steganos Security Suite for 24.95. Review software If you would like to request review copies of the software, please call Kate Boulby on 0208 996 1652 or email her at kboulby@prompt-communications.com. About Steganos About Steganos: Founded in 1996 in Germany, Steganos offers a complete portfolio of user-friendly security and privacy products, including encryption/steganography, antivirus protection, personal firewall and internet anonymity software. Steganos has more than two million users throughout Europe, North America and Latin America. The company markets and sells its products through its website and through its growing network of global resellers, retailers and electronic software distributors. Steganos is a privately held company. For more information on Steganos, see: www.steganos.com