Cipher is the solution to your needs for information protection. Cipher is a tool that allows the storage of files in an encrypted form, to eliminate their vulnerability, Cipher also protects your personal e-mails by making them illegible for non authorized users
- Cipher provides a secure way to share information, by certifying its integrity through the use of a number of mathematical algorithms including AES, TDES, RSA and PGP
- Cipher verifies the integrity of the information through the implemented encryption algorithms. It also validates the authenticity of the information source using digital signature functionality
- One of the major benefits of the system is insuring privacy, allowing access of information in encrypted files and e-mails only to authorized persons
- Cipher allows an easy, reliable and secure exchange of information between people and organizations
- File Monitor: Automatically encrypts or decrypts documents that arrive to a specific file and then transfers them to a different file
- File Signature: Functionality that allows the information receptor the certainty about the origin of the information, that the sender guarantees by the use of digital signatures
- Add In for Microsoft Outlook that allows to automatically encrypt and sign outgoing mail
- Windows Integration: Fully integrates with the environment of this operating system
- Management of Digital Certificates: Encrypts, decrypts and signs files using digital certificates issued by certification entities
- Information Protection: In case of loss of a portable device, there is no risk in compromising important or confidential information since files are completely illegibl
It encrypts, decrypts and signs files using digital certificates issued by certification entities. Must select a key form a key store that includes symmetric and asymmetric keys, and digital certificates and envelopes and select the option encrypt or decrypt file.
If symmetric keys are used the person that encrypts the file and the person that decrypt it must use the same key.
If you want to use an asymmetric key, the person that encrypts the file (person A) must have the public key of the person that is going to decrypt the file (person B) and person B must have his private key to decrypt the file encrypted by person A.