Risk
7/31/2007
03:39 AM
50%
50%

Utimaco Intros Crypt 3.50

Utimaco has developed SafeGuard LAN Crypt 3.50 to target the requirements of system administrators and security officers

OBERURSEL, Germany -- Utimaco – The Data Security Company has developed SafeGuard LAN Crypt 3.50 to target the requirements of system administrators and security officers: the new version of its multi-user data encryption system offers improved client handling together with stronger performance, and guarantees persistent encryption even after files are copied or moved. Its new Unicode compatibility makes this Utimaco solution especially attractive to companies that are active on a global level due to its seamless integration into the corporate infrastructure.

SafeGuard LAN Crypt is a data encryption system that only lets authorized users and user groups access sensitive data across an organization. Its new version makes client handling even easier: The integration of Windows Explorer extensions in SafeGuard LAN Crypt 3.50 enables a quick display of encrypted files’ status. The details view in Windows Explorer now has an additional, optional column which displays key names. You can create encryption profiles centrally, or delegate this task to your subsidiaries. Security officers can access an unlimited number of keys, which they can assign to individual users. No problems with backing up and recovering keys because they are archived securely in an administration database. Replication mechanisms ensure that data can be synchronized throughout your company.

Encryption mode is involved in every operation: SafeGuard LAN Crypt 3.50 guarantees that encrypted files continue to be fully protected even after they are copied or moved. It makes no difference whether data is stored on mobile media and data media like UDF-formatted CDs and DVDs: it stays encrypted, no matter what happens.

System administrators can guarantee the confidentiality of data at every one of your company sites or servers as well as within regional user groups and users. As part of this process, a user's encryption rules are derived automatically from their group membership. This ensures that changes are implemented seamlessly and securely - especially important when new members of staff join the company, when people move department, or when restructuring measures are carried out. Companies that are active in the global arena will find this new version particularly attractive because it offers full Unicode support, for paths, keys, user names and certificates.

"SafeGuard LAN Crypt 3.50 will remove much of the burden of responsibility from security officers and system administrators because they can delegate key management tasks hierarchically and spread the load to other colleagues", said Thomas Huettner, Product Manager at Utimaco, describing the approach to client handling. "This mechanism assigns fixed and definite rights to a number of security officers whilst the master security officer retains all the management rights himself. This ensures that sensitive administrative tasks can only be performed under supervision." A company's data security is no longer compromised when the person responsible for a particular area goes on vacation, becomes ill or leaves the company.

Utimaco Safeware AG

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.