November 01, 2003
- Ease of Use:
- Value for Money:
- Overall Rating:
Even authorized users cannot copy or decrypt files to forward them to unauthorized users
Not a general-purpose file encryption tool; full email integration with Outlook only
Comprehensively protects Microsoft Office files and Outlook emails throughout their lifecycle
Adhaero Doc is not a general-purpose encryption product, but it uses encryption technology to secure Microsoft Office files throughout their lifecycle. It also integrates with Microsoft Outlook to provide the same protection to emails. It is best described as a digital rights management product.
Unlike other file encryption products, the encryption system resides within the document or email itself and is not the same as encrypting files and folders. And unlike traditional encryption, it stays with the document wherever it goes. Users authorized to read and work with the document can't 'decrypt' and save it in an unencrypted form that might be transmitted to unauthorised third parties.
Users collaborating on the preparation of a document may be allowed to edit it but can be prevented from cutting, pasting, forwarding, or printing it without permission - they can even be prevented from accessing it until a given date or time and it can have an expiration date after which it is effectively destroyed. Even screen capture may be prohibited. Editing can also be prevented, if required, and each of these different exclusions are quite independent so you can allow or deny them in any combination.
With Outlook, email forwarding can be explicitly disallowed, so that the recipient can only 'reply' to the original sender. One restriction with email is that the recipient must use Outlook to be able to read the email - so web-mail is not supported. Nevertheless, protected attachments can be sent to any email client or web-mail user. You do not need a full version of Adhaero Doc software to read and work with protected documents, you can use a free 'document reader' application.
Key recovery is supported both by a hierarchy of users, in which higher level users can control documents created by those below, and by a specific Document Recovery Scheme should a top-level user defect. This hierarchy also allows excellent central management and control of users, who may be authorized to create protected documents, by forcing 'templates' on them, if required. Authentication may be made by a choice of password, NT workgroups, or Adhaero Doc groups.
Platform support is Windows 98/NT4/2000/XP, and Microsoft Office 2000 or Office XP must also be installed. Files that may be protected include Word, Excel, PowerPoint documents and Outlook emails. The encryption algorithm is 256-bit AES.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry