November 01, 2003
- Ease of Use:
- Value for Money:
- Overall Rating:
Provides PC access control with two-factor authentication of users.
Although you can encrypt files for transmission by email, it does not offer the convenience of integration with email clients.
A comprehensive disk encryption system with enterprise-class features such as key recovery and automated password recovery
SecureDoc is a disk encryption product that codes the entire hard disk, including operating system files and boot sector. Therefore it provides authentication of the user before the computer even boots up. It can also be used to encrypt all types of removable drives and media, including Flash cards. Although it can be installed in a password-only single-user environment, it provides an upgrade path to full enterprise-wide PKI and two- and three-factor authentication, integrating with third-party tokens.
Key recovery is not really a problem with SecureDoc. In a single-user environment, keys may be backed up to removable media and stored securely by the administrator, who can also prevent users generating or using their own keys. Keys that are backed up are still protected by a password. In an enterprise environment, all keys are generated centrally and securely stored and archived. Also, you can create an emergency boot disk for when the master boot record is damaged - this ensures that you will not be faced with a situation where the computer, and the data on it, become inaccessible.
An enterprise would install the optional SecureDoc Central Database, which enables the administrator to manage keys and support users remotely, without having to visit each PC. It adds extra functionality, such as password recovery and configurable strong password rules, to enhance the support and management of users. There is a facility for secure remote recovery using a one-time challenge-response system, as well as an automated, self-service, web-based password recovery system with unlimited challenge questions.
An additional feature is Disk Lock, which can be used to control user access to drives, whether or not they are encrypted. For example, to prevent data export by prohibiting write access to a floppy drive, or to prevent installation of unauthorized software by prohibiting read access to floppy and CD-ROM.
Quite apart from the disk encryption functionality, files and folders can also be encrypted - this can be useful for sending data by email, removable media, or sharing it on network drives. There is also a secure deletion facility that can overwrite data up to 35 times.
Windows 98SE/ME/NT/2000/ XP platforms are supported. Bulk data encryption uses the 256-bit AES encryption algorithm. Keys are stored, usually on hardware tokens, encrypted with the RSA algorithm.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Senior Network Security Engineer, London, £68-85k + package
Infosec People - England, London
Information Security Risk Manager, £45-55k + bens
Infosec People - West Midlands, England, Coventry
SOC Analyst, Aldershot, £55-63k + benefits
Infosec People - England, Aldershot, Hampshire
Security Architect, Cardiff - to £70k Basic
Infosec People - Cardiff, Wales
Sign up to our newsletters
SC Magazine UK Articles
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Met Police grab suspect with phone unlocked to get hold of data
- Cyber-security must reflect risk not just regulation
- Data centres are on the move - where will they end up?
- The information security implications of M&A deals
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Is BYOD your company's norm? Beware the ghosts of data past this Christmas
- Over 400,000 phishing sites have been detected each month in 2016
- TalkTalk customers urged to get routers swapped over hacker fears
- Report: Mirai 'is just the tip of the iceberg'
- Avalanche takedown involved searches in 40 countries