The name of the base system (platform): | Aladdin Secret Disk |
Developers: | Aladdin R.D. |
Technology: | Cybersecurity - Means of enciphering |
Content |
The system of confidential information protection and the personal data which are stored and processed on the personal computer running the operating system of family Microsoft Windows with a possibility of protection of the system section and two-factor authentication of the user before loading of the operating system and collective work with confidential data on network.
- Data protection from unauthorized access;
- Two-factor authentication using electronic key of eToken;
- Protection of the system section;
- Transparent work for the user;
- Compliance to requirements of the legislation for personal data protection;
- Net surfing with the protected disks for small user groups;
When Secret Disk 4 Workgroup Edition is necessary?
- During the work on the notebook. Loss or theft of the notebook, unauthorized use by strangers (during the business trips on vacation).
- During the work on the personal computer at office. Unauthorized access to data on a local network or unauthorized use by strangers during absence of the user in a workplace.
- The computer is transferred to service maintenance. Unauthorized access to data during repair and service work by internal IT service or external service company.
- Information of confidential character is transferred or sent on removable mediums. Loss or theft of carriers.
- For the organization of safe collective work with confidential information in network for small user groups.
- It is necessary to provide fulfillment of requirements of the Federal law on personal data of July 27, 2006. Violation of confidentiality of personal data which are stored and processed on personal computers in the organization.
Appointment of Secret Disk 4 Workgroup Edition
- Protection against unauthorized access and disclosure of the confidentiality of information which is stored and processed on the personal computer or the notebook.
- Data protection at transfer and storage on removable mediums.
- Differentiation of user rights on access to the protected information using reliable two-factor authentication (ownership of electronic key of eToken and knowledge of the password).
Distinctive features of Secret Disk 4 Workgroup Edition
Reliable data protection
- Enciphering of sections on hard drives, volumes on dynamic disks, virtual disks and removable mediums.
Protection of system hard drive partition
- System hard drive partition contains a large number of information which is of special interest for hackers, competitors or insiders. For example, accounts of users, logins and passwords to different information resources, e-mail, license information of the used programs, etc. are stored in the system section. Malefactors can obtain all these data, analyzing the OS temporary files, swap files, files magazines of applications, memory dumps and also an image saved on a disk upon transition of a system to the "sleeping" mode.
- Secret Disk 4 Workgroup Edition, unlike many competitors, allows to protect the system section and also information which is stored on it.
Loading of the operating system on electronic key of eToken
- Having got access to the personal computer, the malefactor or the unfair employee can use it for gaining access to the closed resources (for example, to corporate servers or payment system of the user). Standard means of authorization of the operating system Microsoft Windows cannot reliably limit loading and work in the operating system. Use of electronic USB keys and smart cards of eToken for authentication of users before loading of OS guarantees access to the computer only of authorized representatives.
- Secret Disk 4 Workgroup Edition provides the safest and the procedure of confirmation of the rights of the user reliable today – two-factor authentication – the data access requires not only existence of an USB token, but also knowledge of the password for loading of the operating system.
Transparent enciphering
- Transactions of initial encryption or complete reenciphering for modern disks of large volume can demand considerable time that can cause certain inconveniences for the user.
All transactions of encryption, reenciphering and deciphering are carried out to Secret Disk 4 Workgroup Edition in the background. At the runtime these transactions the disk is completely available to work that gives the chance to use the computer, without waiting for the end of process of enciphering.
Restoring access to the ciphered disks
- If your electronic key, the personal computer or a separate disk with data got into strange hands, you can be quiet for safety and unavailability of your data – nobody, except you will not be able to get access to them in circumvention of the Secret Disk system.
In case of loss or breakdown of the Secret Disk 4 Workgroup Edition USB key the possibility of reserve restoring access to data is provided.
Collective work on network with the ciphered data
- Special edition Secret Disk 4 Workgroup Edition creates on the personal computer the protected disks intended for the organization of safe collective work with confidential information in network for small user groups (no more than 10 simultaneous connections on network).
Irreversible removal of data
- In Secret Disk 4 Workgroup Edition two safety features of data are implemented: irreversible removals of data; movement of the file without a possibility of recovery on an initial way.
Additional features
- Data protection from failures during enciphering transactions, including interruptions of power supply.
- Support of the mode of energy saving for notebooks.
- Runtime allocation of speed of enciphering.