'Delivering a good service, supplying only the best solutions and getting it right first time - ensures satisfied customers and resources focussed on helping customers not making excuses'.
Laptop Encryption
Secuware C2K

Home Products/Services Laptop Encryption

Laptop Encryption

Secuware Computers - whether desktops, laptops, or PDAs – are loaded with critical data that can – as we read in the news almost every day – be lost, stolen, or hijacked in any number of ways. C2K protects that critical data more powerfully, and more transparently to users, than any solution currently on the market.

Encryption of the entire disk secures the data but with many programs this means a performance penalty. With ever popular Netbooks the impact is so great as to render the Netbook next to useless. C2K provides military grade protection without the performance penalty - win win!

Complete physical and/or logical encryption of hard disks and removable media.
To prevent information leakage, C2K can encrypt any information that leaves the PC, either on physical media or over the network. CDs and other removable media created within an organisation can be accessed by authorised users within the organisation, but cannot be read outside the corporate environment, creating what Secuware terms Closed Circuits for Information. In the same way, C2K can block unencrypted media from being read on corporate PCs, preventing unauthorised use of the company's resources. Integration with the Windows network infrastructure ensures quick and easy creation of workgroups that share information access requirements.

Complete physical hard disk encryption
The only way to ensure that all the information is protected is the complete physical encryption of the hard disk. Encrypting all the hard disk's physical sectors protects even temporary files and traces remaining on the disk that could be otherwise exploited by unauthorised users.

Information encryption over the network
Today’s file systems offer a high level of access control, but any user with administrator privileges can access any other user's information. No matter how thorough your security policy, any document stored unencrypted on the network is readable by anyone with admin-level permissions. C2K encompasses any storage resources used by employees and contractors, including shared folders on the network. So when users store information on the network, that information is encrypted and protection is assured.

Public Key Infrastructure (PKI) integration
C2K is PKI ready and as such can perform secure logon using digital certificates provided by any vendor based on the X.509 v3 and LDAP x.500 standards. Combining Pre Boot Authentication and the use of digital certificates on physical access tokens provides maximum access control by enforcing network-wide user identification and validation.

Telephone: 01 4019420  •  Fax: 01 4019079  •  Email:
Copyright © 2008 Route 2 Solutions, Ltd. All rights reserved