Risk
7/31/2007
03:39 AM
Connect Directly
RSS
E-Mail
50%
50%

Utimaco Intros Crypt 3.50

Utimaco has developed SafeGuard LAN Crypt 3.50 to target the requirements of system administrators and security officers

OBERURSEL, Germany -- Utimaco – The Data Security Company has developed SafeGuard LAN Crypt 3.50 to target the requirements of system administrators and security officers: the new version of its multi-user data encryption system offers improved client handling together with stronger performance, and guarantees persistent encryption even after files are copied or moved. Its new Unicode compatibility makes this Utimaco solution especially attractive to companies that are active on a global level due to its seamless integration into the corporate infrastructure.

SafeGuard LAN Crypt is a data encryption system that only lets authorized users and user groups access sensitive data across an organization. Its new version makes client handling even easier: The integration of Windows Explorer extensions in SafeGuard LAN Crypt 3.50 enables a quick display of encrypted files’ status. The details view in Windows Explorer now has an additional, optional column which displays key names. You can create encryption profiles centrally, or delegate this task to your subsidiaries. Security officers can access an unlimited number of keys, which they can assign to individual users. No problems with backing up and recovering keys because they are archived securely in an administration database. Replication mechanisms ensure that data can be synchronized throughout your company.

Encryption mode is involved in every operation: SafeGuard LAN Crypt 3.50 guarantees that encrypted files continue to be fully protected even after they are copied or moved. It makes no difference whether data is stored on mobile media and data media like UDF-formatted CDs and DVDs: it stays encrypted, no matter what happens.

System administrators can guarantee the confidentiality of data at every one of your company sites or servers as well as within regional user groups and users. As part of this process, a user's encryption rules are derived automatically from their group membership. This ensures that changes are implemented seamlessly and securely - especially important when new members of staff join the company, when people move department, or when restructuring measures are carried out. Companies that are active in the global arena will find this new version particularly attractive because it offers full Unicode support, for paths, keys, user names and certificates.

"SafeGuard LAN Crypt 3.50 will remove much of the burden of responsibility from security officers and system administrators because they can delegate key management tasks hierarchically and spread the load to other colleagues", said Thomas Huettner, Product Manager at Utimaco, describing the approach to client handling. "This mechanism assigns fixed and definite rights to a number of security officers whilst the master security officer retains all the management rights himself. This ensures that sensitive administrative tasks can only be performed under supervision." A company's data security is no longer compromised when the person responsible for a particular area goes on vacation, becomes ill or leaves the company.

Utimaco Safeware AG

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-3518
Published: 2014-07-22
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exec...

CVE-2014-3530
Published: 2014-07-22
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.