C2K protects that critical data more powerfully, and more transparently to users, than any solution currently on the market. Originally developed for the Spanish Defense Ministry, C2K really does offer military-grade security for your critical corporate data.
- Closed Circuits for Information (CCI):
To prevent information leakage, C2K can encrypt any information that leaves the PC, either on physical media or over the network. CDs and other removable media created within an organisation can be accessed by authorised users within the organisation, but cannot be read outside the corporate environment, creating what Secuware terms Closed Circuits for Information. In the same way, C2K can block unencrypted media from being read on corporate PCs, preventing unauthorised use of the company's resources. Integration with the Windows network infrastructure ensures quick and easy creation of workgroups that share information access requirements.
- Complete Physical Hard Disk Encryption:
The only way to ensure that all the information is protected is the complete physical encryption of the hard disk. Encrypting all the hard disk's physical sectors protects even temporary files and traces remaining on the disk that could be otherwise exploited by unauthorised users.
- Information Encryption Over The Network:
Today’s file systems offer a high level of access control, but any user with administrator privileges can access any other user's information. No matter how thorough your security policy, any document stored unencrypted on the network is readable by anyone with admin-level permissions. C2K encompasses any storage resources used by employees and contractors, including shared folders on the network. So when users store information on the network, that information is encrypted and protection is assured.
- Public Key Infrastructure (PKI) Integration:
C2K is PKI ready and as such can perform secure logon using digital certificates provided by any vendor based on the X.509 v3 and LDAP x.500 standards. Combining Pre Boot Authentication and the use of digital certificates on physical access tokens provides maximum access control by enforcing network-wide user identification and validation.
For further details or pricing information, please call +44 (0)20 8733 7101 or email firstname.lastname@example.org