Risk
7/31/2007
03:39 AM
50%
50%

Utimaco Intros Crypt 3.50

Utimaco has developed SafeGuard LAN Crypt 3.50 to target the requirements of system administrators and security officers

OBERURSEL, Germany -- Utimaco – The Data Security Company has developed SafeGuard LAN Crypt 3.50 to target the requirements of system administrators and security officers: the new version of its multi-user data encryption system offers improved client handling together with stronger performance, and guarantees persistent encryption even after files are copied or moved. Its new Unicode compatibility makes this Utimaco solution especially attractive to companies that are active on a global level due to its seamless integration into the corporate infrastructure.

SafeGuard LAN Crypt is a data encryption system that only lets authorized users and user groups access sensitive data across an organization. Its new version makes client handling even easier: The integration of Windows Explorer extensions in SafeGuard LAN Crypt 3.50 enables a quick display of encrypted files’ status. The details view in Windows Explorer now has an additional, optional column which displays key names. You can create encryption profiles centrally, or delegate this task to your subsidiaries. Security officers can access an unlimited number of keys, which they can assign to individual users. No problems with backing up and recovering keys because they are archived securely in an administration database. Replication mechanisms ensure that data can be synchronized throughout your company.

Encryption mode is involved in every operation: SafeGuard LAN Crypt 3.50 guarantees that encrypted files continue to be fully protected even after they are copied or moved. It makes no difference whether data is stored on mobile media and data media like UDF-formatted CDs and DVDs: it stays encrypted, no matter what happens.

System administrators can guarantee the confidentiality of data at every one of your company sites or servers as well as within regional user groups and users. As part of this process, a user's encryption rules are derived automatically from their group membership. This ensures that changes are implemented seamlessly and securely - especially important when new members of staff join the company, when people move department, or when restructuring measures are carried out. Companies that are active in the global arena will find this new version particularly attractive because it offers full Unicode support, for paths, keys, user names and certificates.

"SafeGuard LAN Crypt 3.50 will remove much of the burden of responsibility from security officers and system administrators because they can delegate key management tasks hierarchically and spread the load to other colleagues", said Thomas Huettner, Product Manager at Utimaco, describing the approach to client handling. "This mechanism assigns fixed and definite rights to a number of security officers whilst the master security officer retains all the management rights himself. This ensures that sensitive administrative tasks can only be performed under supervision." A company's data security is no longer compromised when the person responsible for a particular area goes on vacation, becomes ill or leaves the company.

Utimaco Safeware AG

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8148
Published: 2015-01-26
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.

CVE-2014-8157
Published: 2015-01-26
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.

CVE-2014-8158
Published: 2015-01-26
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.

CVE-2014-9571
Published: 2015-01-26
Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.

CVE-2014-9572
Published: 2015-01-26
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.