Menu
Your Cart

Secuware C2K

Secuware C2K

Need more information on this product?

Please contact us on +44 (0)20 8733 7100 or via our online form.

Contact Us

If you are not currently a customer, you can apply for an account.

Register here


  • SKU: SECUWARECK


Critical data providing Pre-Boot Authentication (PBA) that accepts digital certificates, smart cards or USB tokens as valid user identification. If no acceptable identification is supplied, the boot process is terminated.

C2K protects that critical data more powerfully, and more transparently to users, than any solution currently on the market. Originally developed for the Spanish Defense Ministry, C2K really does offer military-grade security for your critical corporate data.

Key Features:

  • Closed Circuits for Information (CCI): To prevent information leakage, C2K can encrypt any information that leaves the PC, either on physical media or over the network. CDs and other removable media created within an organisation can be accessed by authorised users within the organisation, but cannot be read outside the corporate environment, creating what Secuware terms Closed Circuits for Information. In the same way, C2K can block unencrypted media from being read on corporate PCs, preventing unauthorised use of the company's resources. Integration with the Windows network infrastructure ensures quick and easy creation of workgroups that share information access requirements.
  • Complete Physical Hard Disk Encryption: The only way to ensure that all the information is protected is the complete physical encryption of the hard disk. Encrypting all the hard disk's physical sectors protects even temporary files and traces remaining on the disk that could be otherwise exploited by unauthorised users.
  • Information Encryption Over The Network: Todays file systems offer a high level of access control, but any user with administrator privileges can access any other user's information. No matter how thorough your security policy, any document stored unencrypted on the network is readable by anyone with admin-level permissions. C2K encompasses any storage resources used by employees and contractors, including shared folders on the network. So when users store information on the network, that information is encrypted and protection is assured.
  • Public Key Infrastructure (PKI) Integration: C2K is PKI ready and as such can perform secure logon using digital certificates provided by any vendor based on the X.509 v3 and LDAP x.500 standards. Combining Pre Boot Authentication and the use of digital certificates on physical access tokens provides maximum access control by enforcing network-wide user identification and validation.