CryptoEx: Applications for Encryption and Digital Signature

Similar documents
SECURE DATA EXCHANGE

Secure Messaging Buyer s Guide

Mobile Data Security Essentials for Your Changing, Growing Workforce

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

10 Hidden IT Risks That Might Threaten Your Business

IBM Tivoli Directory Server

MU2b Authentication, Authorization and Accounting Questions Set 2

SmartExporter 2013 R1

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

Security Enhancements

Why Use Cisco Network Storage Systems for Your Business

DIGITAL SIGNATURES The entire organisation benefits

Steganos Safe Professional th June 2007

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Details on Integration Features

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

Security Challenges: Integrating Apple Computers into Windows Environments

Dooblo SurveyToGo: Security Overview

Accessing CharityMaster data from another location

SmarterMail v. Exchange: Admin Comparison

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents

End-to-End Encryption for Everybody?

Encrypted containers for secure file transport

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

Complete document security

Top. Reasons Legal Teams Select kiteworks by Accellion

iq.suite Crypt Pro - Server-based encryption - Efficient encryption for IBM Domino

Understanding Office 365: Is A Cloud Based Solution Right For Your Business?

OpenScape Web Collaboration

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

Are You Avoiding These Top 10 File Transfer Risks?

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

Product Brief. Circles of Trust.

New Reseller Opportunities. Print2 . Internet Print Server

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

Authentication Methods

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)

FilesAnywhere Features List

CPE Webcast Encrypting PDF Files in Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by:

GFI Product comparison. vs. Archiver

midentity midentity Basic KOBIL midentity Basic Mobile, Secure and Flexible

efax Corporate for Independent Agent Offices

The Dropbox Problem: It s Worse than You Think

Storage and Retrieval - Systematic Indexing in Document Pool

Security for Wireless Handhelds

STOP READ THIS FIRST. Creating Your BlackBerry Account Guide

Is your business future ready?

BlackBerry Enterprise Server Express for Microsoft Exchange

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Identity Management as a Service

The Device Has Left the Building

PKI Credentialing Handbook

white paper SMS Authentication: 10 Things to Know Before You Buy

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents. Feature Sheet

What's new in DocuWare Version 6.7

GFI Product comparison. vs. Archiver

5 OAuth Essentials for API Access Control

A (sample) computerized system for publishing the daily currency exchange rates

BlackBerry Enterprise Solution Security

Video Conferencing & Skype for Business: Your Need-to-Know Guide

Paragon Protect & Restore

Simplify Backups. Dell PowerVault DL2000 Family

What is ISO ISMS? Business Beam

IBM Case Manager on Cloud

File Services. File Services at a Glance

Security Using Digital Signatures & Encryption

How to Compare Server Online Backup and Recovery Service Providers

Bill Wear. VirtualVault Product Manager. Internet Banking Case Study

archiving for Microsoft Outlook and Exchange Server

UNCLASSIFIED. Mimecast UK Archiving Service Description

7 Keys to Comparing Google Apps Premier Edition with Microsoft Exchange Server 2003/2007

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Symantec Small Business Solutions

Secure Services 2018

Asher Gahadoushi President. Robert Mykland Technology Advisor- Inventor

The Global Leader in Thin Client Management & Industrial Mobility Solutions. Platform 9. Productivity Visualization Security Mobility

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Use Digipass two-factor authentication

Version: 4.0. Quatrix Data Sheet. January 2018 Author: Maytech

The Upside to Active Mail Management - Five Reasons to Actively Manage Mail

Achieving End-to-End Security in the Internet of Things (IoT)

IBM Archiving Solution DB2 CommonStore for Lotus Domino

COMPUTER & INFORMATION TECHNOLOGY CENTER. Information Transfer Policy

Guide. A small business guide to data storage and backup

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Understanding Managed Services

Federal Voting Assistance Program (FVAP)

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Lenovo Europe, Middle East, and Africa Hardware Announcement ZG , dated January 27, 2009

Directory Attender. Version 1.0x. White Paper. Directory Attender is a member of the Attender Utilities family

1. Publishable Summary

digital innovation Experience the power of CopyCentre 232/238/245/255 WorkCentre 232/238/245/255 WorkCentre Pro 232/238/245/255

bizhub Security: Hard Disk Drive Data Protection

STREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS. VMware Workstation and Fusion. A White Paper for IT Professionals

GFI Product comparison. vs. Archiver

HP Security Solutions for business PCs. Comprehensive protection measures so you can work smarter and with greater confidence.

Mailbox Management with Symantec Enterprise Vault.cloud

A Foxit Software Company White Paper

Transcription:

CryptoEx: Applications for Encryption and Digital Signature

CryptoEx Products: Overview CryptoEx Outlook CryptoEx Notes CryptoEx Volume CryptoEx Pocket CryptoEx File CryptoEx Office CryptoEx Business Server CryptoEx Certificate Authority CryptoEx Enterprise Keyserver CryptoEx Toolkit CryptoEx offers you comprehensive solutions for encryption and digital signature from one source. CryptoEx achieves confidentiality of your sensitive information with internationally recognized encryption standards. All CryptoEx products exclusively use strong encryption with long keys, whose reliability has proven itself over the years. an electronic variant of a handwritten signature. Workflow that was only possible on paper can now be taken care of with the push of a button. This increases the productivity of your employees and saves money, for example when processing travel expenses. CryptoEx has proven itself in large enterprises and can be easily centrally managed. Comprehensive solutions for encryption and digital signature from one source Based on internationally established standards (e.g. OpenPGP, S/MIME) Protects your data with strong encryption, even against professional hackers Modular architecture provides investment protection Makes secure communication possible with any business partner Digital signature lowers costs and effectively protects against forgery and fraud Established in large enterprises Therefore, your data stays protected, also over a long period of time. Even professional hackers don t have a chance to access your information. As the only product range of its kind worldwide, CryptoEx has a modular architecture that allows a choice of different standards according to requirements, such as the widely used protocols OpenPGP and S/MIME. This modular setup guarantees that you can securely communicate with all your business partners. Furthermore, the outstanding architecture offers you investment protection should you require other standards in the future. CryptoEx can be comfortably integrated with already existing structures, such as an LDAP directory, to make administration as simple as possible. All CryptoEx products are usability tested, to reach exceptional user-friendliness and acceptance from your employees. You can also digitally sign your data with CryptoEx according to digital signature laws. This is equivalent to 2

CryptoEx Outlook Security plug-in for Microsoft Outlook Strong e-mail encryption Based on internationally established standards (e.g. OpenPGP, S/MIME) Makes secure communication possible with any business partner Keeps your e-mails and attachments confidential Digital signature lowers costs and effectively protects against forgery and fraud No software needed on the server Automatically finds recipients keys Supports Terminal Servers Because even unauthorized persons can easily read another user s e-mail, many enterprises send important documents solely with a courier service. With CryptoEx Outlook, you can use the fast delivery and the low cost of electronic mail, while ensuring that the confidentiality of your information is protected through encryption. CryptoEx Outlook also enables the use of a digital signature, that effectively protects you from forgery and fraud in your electronic business, in accordance with digital signature laws. You no longer need to manually sign a document, put it in an envelope and send it by post. With a simple mouse click you have taken care of your business. The electronic signature not only identifies the sender, but also ensures that the contents of the message have not been manipulated during the transmission. To guarantee easy usage, it can be simply determined which recipient will automatically receive encrypted or signed messages. This method saves time and money and ensures a smooth workflow. CryptoEx Notes Security plug-in for Lotus Notes Includes the same proven features as CryptoEx Outlook No software on Lotus Domino server required No changes of Lotus Notes templates necessary CryptoEx Notes is a security plug-in for Lotus Notes and has the same proven functionality as CryptoEx Outlook. Special characteristics of CryptoEx Notes include not having to make any changes to the Lotus Notes templates or to the Lotus Domino servers. This is a great advantage, especially with user-defined templates. If needed, the Lotus Notes database can be used for key management. 3

CryptoEx Volume Protects the confidentiality of the data in your notebook from theft or loss Folders or drives are automatically encrypted Encryption if the entire storage medium such as CD-R, ZIP and USB drives or removable disks Effectively protects against industrial espionage, blackmail and the release of sensitive information If a notebook is lost or stolen, the price of the hardware is often secondary - the loss of the information saved in the Notebook is much more important. In an FBI study from 2001, 64% of surveyed firms reported the loss of notebooks with sensitive data. The normal Windows log-in offers practically no protection in such a case. CryptoEx Volume works somewhat like an electronic safe and allows you to encrypt selected folders or entire drives without noticeable delay. Such a secure notebook is worthless to a hacker. CryptoEx Volume effectively protects your enterprise from industrial espionage, blackmail or the release of sensitive information. After logging on to the Notebook, the user does not notice that he is using CryptoEx Volume. The data is automatically encrypted before being saved. Even if the electricity goes out or the battery dies, no unencrypted data remains on the hard drive. CryptoEx Pocket Security application for encryption and digital signature on mobile devices Same user interface Protects the confidentiality of the data on your Pocket PC or handheld PC when stolen or lost Makes reading and sending secure e-mails possible while on the go Effectively protects against industrial espionage, blackmail and the release of sensitive information Mobile devices have taken over in today s businesses and the market figures are still growing. Since Pocket PCs and handheld PCs are being increasingly integrated into business infrastructures, a comprehensive security concept must also include these devices. CryptoEx Pocket makes it possible for you to securely read and send e-mails on your mobile device. CryptoEx Pocket can also encrypt and sign sensitive files on the device. CryptoEx Pocket effectively protects the enterprise from industrial espionage, blackmail and the release of sensitive data. CryptoEx Pocket is just as easy to use as CryptoEx Outlook, CryptoEx Notes and CryptoEx File. It also automatically synchronizes itself with these products. Because of this function, all important data is worthless for unauthorized persons when the device is lost or stolen. 4

CryptoEx File Security application for encrypting and digitally signing data Protects the confidentiality of your files when storing on servers, workstations, portable storage media and when transferring over the Internet Digital signature protects data from manipulation for digital archiving and auditing Encryption and signature of texts in any application CryptoEx File is a security application for encrypting and digitally signing files. CryptoEx File allows you to store encrypted files. When saving, the user decides whether just the user or other people may access the data. This allows highly sensitive information to be encrypted on servers, workstations or portable media. You can be sure that no unauthorized persons can access your information. CryptoEx File also allows you to sign files, for example for secure archiving of data. Auditors can prove the authenticity of electronically archived information through the digital signature. Therefore, even complex and sensitive data can be archived electronically and the normally space-taking physical archive is reduced. Files, such as technical drawings, often become too big to be sent via e-mail. In this case, the file can be encrypted with CryptoEx File before being sent over the Internet using a transfer protocol. This protects your technical innovations from your competitor s eyes and allows you to promptly communicate between departments and with business partners. CryptoEx File also allows you to comfortably encrypt and sign text information in any application. CryptoEx Office Digital signature integration for Microsoft Office Offers secure auditing for electronic workflows Security viewer protects from forgery and fraud CryptoEx Office allows you to digitally sign documents directly from Microsoft Office. Therefore, the electronic signature can be optimally integrated in the workflow. With CryptoEx Office, many tasks that were previously only possible on paper can be completed on your screen with a simple mouse click. Example: Several signatures are often needed to process a firm s travel expense reports. On paper, this process is very costly and time consuming. The electronic method offers great potential for higher efficiency and cost reduction, while ensuring that no one can manipulate the documents. This method can be easily applied to other areas. The CryptoEx Office security viewer makes sure that you only sign the data that you can see on your screen. This way, no one can make you sign white text on a white background. CryptoEx Office integrates optimally into Microsoft Office, which makes usage very easy for the users. With CryptoEx Office, customized solutions and third party applications can also be integrated into the comprehensive concept. This is made possible, because all features can also be used outside of Microsoft Office. 5

CryptoEx Business Server Application for the comfortable management of CryptoEx products Comprehensive solution for 10 to 1,000 users Ready for operation in one hour Easy administration through automated key generation, certification and distribution Central key backup for case of emergency Keyserver for simple key exchange Flexible license model Comfortable use over web interface A central management of CryptoEx clients is recommended with ten or more users. The CryptoEx Business Server is especially suited for departments, medium-sized enterprises and pilot installations. With an installation time of only one hour, CryptoEx Business Server offers a fast, pragmatic solution. The CryptoEx Business Server creates, manages and certifies a so-called key for every user. This makes managing CryptoEx products even easier. A copy of the key is saved in a highly secure database. This central backup also ensures that an enterprise can also read encrypted data if the employee forgets his password or is no longer with the company. The task of an integrated keyserver is to make keys publicly available in a central location somewhat like a telephone book. The keys are automatically retrieved directly from the keyserver. Therefore the employees no longer need to exchange the keys among themselves (peer-to-peer). To offere a flexible licensing model, the CryptoEx Business Server is not licensed with a fixed cost, but rather per user. CryptoEx Certificate Authority Application for comfortable administration of CryptoEx products Manages X.509 as well as OpenPGP keys Flexible product for high expectations of large organizations Central key backup for case of emergency Integration of existing user management Use of open standards and interfaces for individual customization Role-based concept for the highest security demands Four eyes concept with critical operations (missile-silo principle) Simple administration through optimal automation The CryptoEx Certificate Authority fulfills the demands of large organizations. It generates, manages and certifies user keys from a central location. This makes managing CryptoEx Clients much easier. The CryptoEx Certificate Authority is the only product worldwide that can manage keys in X.509 (e.g. S/MIME) as well as in OpenPGP format. This reduces costs and protects investments. A copy of the keys is saved in a highly secure database. Through this central backup, it is also ensured that an enterprise can read encrypted data if the employee has forgotten his password or is no longer with the company. The CryptoEx Certificate Authority can be connected with existing databases, such as LDAP, for even easier user management. In doing this, processes can be automated if an employee enters or leaves the company. The CryptoEx Certificate Authority architecture is designed for the highest security demands. A role-based concept ensures a precise division between technical and managerial tasks. For critical operations, the four-eye concept can be defined (missile-silo principle). The CryptoEx Certificate Authority reduces running operating costs due to its simple administration. 6

CryptoEx Enterprise Keyserver Central key directory Integration with existing directories (e.g. LDAP) Allows simple key exchange Eases secure communication with business partners especially when using a firewall Increased availability through clustering Easy to install Does not need an additional database The CryptoEx Enterprise Keyserver is a central directory for public keys. It is normally implemented in combination with the CryptoEx Certificate Authority or as an additional keyserver with the CryptoEx Business Server. A keyserver s job is to make keys available on a central location somewhat like a telephone book. The keys are automatically retrieved directly from the keyserver. Therefore the employees no longer need to exchange the keys among themselves (peer-topeer). For increased availability, the CryptoEx Enterprise Keyserver can be implemented in a cluster. The CryptoEx Enterprise Keyserver is the only product worldwide that can use an LDAP directory as a data source for keys. This makes the secure information exchange with external partners significantly easier, especially when a firewall is installed. The CryptoEx Enterprise Keyserver is easy to install and does not need an additional database. CryptoEx Toolkit Comfortable programming environment for encryption and digital signature Allows the integration of electronic security in customized solutions Accelerates the development process and saves money Suited for the implementation on desktop PCs and servers CryptoEx Toolkit is a programming environment that allows any required integration that is not already covered by the other CryptoEx products. CryptoEx Toolkit makes it easier for you to integrate encryption und digital signatures in existing automated processes, even if it is not a standard application. This also makes the advantages of electronic security usable for customized solutions. otherwise demand many man-years of development time. Therefore you can reach your goal much faster and at a reduced cost. With only a few programming lines, even complex and elaborate cryptographic routines can be used that CryptoEx Toolkit is suitable for implementation on both desktop PCs and servers. 7

Glück & Kanja Technology AG Christian-Pless-Str. 11-13 63069 Offenbach, Germany Phone: +49 (69) 80 07 06-0 Fax: +49 (69) 80 07 06-66 www.glueckkanja.com info@glueckkanja.com