Tag Archives: file encryption

GhostVolt 1.3.2.0

Type: Demo
Cost: $40
Size: 7.68 MB
Release date: Dec 15 2018
Platform: Win2000,WinXP,Win7 x32,Win7 x64,Windows 8,Windows 10,WinServer,WinOther,WinVista,WinVista x64
Publisher’s Site:  http://ghostvolt.com
Publisher’s Product Page:  http://ghostvolt.com
Country: United States of America


GhostVolt

GhostVolt is an easy-to-manage, easy-to-use, smart encryption solution, built for collaboration and teamwork.

GhostVolt encryption is fully automated at every event, ensuring data security and an uninterrupted work-flow at every point on your network. Automated encryption not only saves time and cost but also eliminates the threat of human error and helps to maintain your data loss prevention policies without intervention. Featuring enterprise level 256 bit AES encryption, GhostVolt provides you with the most advanced security standard to date. 256 bit AES encryption is trusted by both enterprises and governments worldwide in mitigating data breach threats. There are no back doors, so you can be sure your data is invisible to nation-states that are equipping themselves for industrial espionage and theft of intellectual property.

GhostVolt has a complete user management system allowing full control of user permissions. The multi-level permissions manager can be fully customized for the needs of your team or business structure. Users with higher administrative access can review or control the movement and status of any digital asset, as well gather full insights into your users, with detailed reports. GhostVolt’s reporting engine offers detailed insight and easy retrieval of data relating to the activities across your GhostVolt network. GhostVolt meets the obligations that come with managing valuable and sensitive data and that understanding is critical to the way we have developed our reporting tools. Industry security standards such as HIPAA and other compliance measures have informed the development of GhostVolt to assist your organization with meeting the latest compliance expectations.

BestCrypt Container Encryption 9.03.16

Type: Shareware
Cost: $59.95
Size: 28.68 MB
Release date: Dec 11 2018
Platform: Win2000,WinXP,Win7 x32,Win7 x64,Windows 8,Windows 10,WinServer,WinOther,WinVista,WinVista x64
Publisher’s Site:  https://www.jetico.com
Publisher’s Product Page:  http://www.jetico.com/products/personal-privacy/bestcrypt-container-encryption
Country: Finland


BestCrypt Container Encryption

To protect your privacy, comply with regulations, such as HIPAA or PCI, and prevent data breaches, BestCrypt Container Encryption delivers ‘on-the-fly’ data encryption that’s easy to use for virtual drives and selected files or folders. BestCrypt encrypts files and folders on Windows, Mac OS X and Linux by utilizing a wide variety of algorithms (AES, Blowfish, Twofish, CAST, GOST 28147-89, Triple-Des, Serpent) and the largest possible key sizes with XTS, LRW and CBC encryption modes. By featuring deniable encryption and dynamic containers Jetico’s file encryption is the best TrueCrypt alternative. BestCrypt Container Encryption includes a full version of BCWipe a Jetico solution to permanently delete files, wipe free space and data remanence.

To protect the data you keep, BestCrypt Container Encryption features:
– Store and access encrypted files easily via virtual drives
– Create and manage multiple containers
– Adjust size of container files (from megabytes to entire drive)
– Enhanced Hidden Containers (deniable encryption)
– Encrypt headers of container files
– Support Public Key Encryption
– Support Secret Sharing Schemes
– Compress one or more files in an encrypted self-extracting archive
– Encrypt Windows Swap File
– Container-level compatibility across Windows, Linux and Mac operating systems
– Includes full version of BCWipe for military-grade file wiping
– Central management for deployment, monitoring and password recovery (Enterprise Edition only)

EaseFilter Secure File Sharing SDK 4.4.2.3

Type: Shareware
Cost: $4999
Size: 3.17 MB
Release date: Jul 30 2018
Platform: Win2000,WinXP,Win7 x32,Win7 x64,Windows 8,Windows 10,WinServer,WinOther,WinVista,WinVista x64
Publisher’s Site:  http://www.easefilter.com
Publisher’s Product Page:  http://easefilter.com/Forums_Files/SecureShare.htm
Country: Canada


EaseFilter Secure File Sharing SDK

Create Windows application to track, control and secure your files in one step with EaseFilter file system filter driver SDK. Dynamically control file access, grant or revoke the file access to the shared files anytime, anywhere even the files were distributed to the users or lost. Prevent the confidential files being copied out with digital right management embedded.

Secure File Sharing With Digital Rights Management.Safeguard file sharing without boundaries. Secure File Sharing combines AES 256 bit encryption with digital rights management to give businesses persistent control over all stages of its life,enables employees to share files with anyone, via any method, without compromising business data or risking liability from data loss.

By leveraging the digital rights management, encryption keys and access policies are stored in the remote central server, so your data is never at risk of being unlocked, stolen or misused, either by internal threats or external attacks.Your files remain control wherever you share them. Wherever your data is stored, on the cloud, on your laptop, on a USB drive, on a backup disk or on someone else’s computer, only you, and those you authorize, can view the contents of those files.

With the centralized policy management, organizations can centrally control the creation, enforcement, and management of security policies to protect documents and files across all applications and systems. This ensures that the most up to date policies are applied and enforced consistently across the enterprise. You can grant or revoke the access control to any user at any time even the files were shared.

Keep tracking and auditing to the shared files.With the complete file access live tracking report, you can monitor who, when and where files are being accessed with the user and process information, computer identities and Geo-location, also know all the unauthorized user information when unauthorized access.