Risk

7/31/2007
03:39 AM
50%
50%

Utimaco Intros Crypt 3.50

Utimaco has developed SafeGuard LAN Crypt 3.50 to target the requirements of system administrators and security officers

OBERURSEL, Germany -- Utimaco – The Data Security Company has developed SafeGuard LAN Crypt 3.50 to target the requirements of system administrators and security officers: the new version of its multi-user data encryption system offers improved client handling together with stronger performance, and guarantees persistent encryption even after files are copied or moved. Its new Unicode compatibility makes this Utimaco solution especially attractive to companies that are active on a global level due to its seamless integration into the corporate infrastructure.

SafeGuard LAN Crypt is a data encryption system that only lets authorized users and user groups access sensitive data across an organization. Its new version makes client handling even easier: The integration of Windows Explorer extensions in SafeGuard LAN Crypt 3.50 enables a quick display of encrypted files’ status. The details view in Windows Explorer now has an additional, optional column which displays key names. You can create encryption profiles centrally, or delegate this task to your subsidiaries. Security officers can access an unlimited number of keys, which they can assign to individual users. No problems with backing up and recovering keys because they are archived securely in an administration database. Replication mechanisms ensure that data can be synchronized throughout your company.

Encryption mode is involved in every operation: SafeGuard LAN Crypt 3.50 guarantees that encrypted files continue to be fully protected even after they are copied or moved. It makes no difference whether data is stored on mobile media and data media like UDF-formatted CDs and DVDs: it stays encrypted, no matter what happens.

System administrators can guarantee the confidentiality of data at every one of your company sites or servers as well as within regional user groups and users. As part of this process, a user's encryption rules are derived automatically from their group membership. This ensures that changes are implemented seamlessly and securely - especially important when new members of staff join the company, when people move department, or when restructuring measures are carried out. Companies that are active in the global arena will find this new version particularly attractive because it offers full Unicode support, for paths, keys, user names and certificates.

"SafeGuard LAN Crypt 3.50 will remove much of the burden of responsibility from security officers and system administrators because they can delegate key management tasks hierarchically and spread the load to other colleagues", said Thomas Huettner, Product Manager at Utimaco, describing the approach to client handling. "This mechanism assigns fixed and definite rights to a number of security officers whilst the master security officer retains all the management rights himself. This ensures that sensitive administrative tasks can only be performed under supervision." A company's data security is no longer compromised when the person responsible for a particular area goes on vacation, becomes ill or leaves the company.

Utimaco Safeware AG

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Google to Delete 'Secure' Label from HTTPS Sites
Kelly Sheridan, Staff Editor, Dark Reading,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The one you have not seen, won't be remembered".
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10653
PUBLISHED: 2018-05-23
There is an XML External Entity (XXE) Processing Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10654
PUBLISHED: 2018-05-23
There is a Hazelcast Library Java Deserialization Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10648
PUBLISHED: 2018-05-23
There are Unauthenticated File Upload Vulnerabilities in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10649
PUBLISHED: 2018-05-23
There is a Cross-Site Scripting Vulnerability in Citrix XenMobile Server 10.7 before RP3.
CVE-2018-10650
PUBLISHED: 2018-05-23
There is an Insufficient Path Validation Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.