Data security “Stealth disk” – for the successful business

Published: 20 October 2003 y., Monday
At the exhibition “Infobalt 2003” Penki kontinentai, UAB Internet and telecommunications centre will present a complex data security solution. You are welcome to visit the stand of the company S1.14. Nowadays having lost the confident information you are risking to loose money. Penki kontinentai offers the companies to use the up-to-date data security means in order to prevent the data from the competitive or criminals. Company’s local network and the personal computer of each employee can be effectively protected from the unauthorised persons by means of the specialised software and devices. “Stealth disk” is a complex data security solution. “Security IT” software and “Aladdin” electronic keys “e- Token” are used for the implementation thereof. The electronic key is a device, which stores an encrypted password; it is as small as the usual door key. Accessing his or her computer or the data stored in the local network an employee connects the electronic key to the computer’s USB port and enters the password once again. The confidential data is stored at so-called “hidden disk” in an encrypted format. The “hidden disk” is created as the file at the computer’s hard disk. The unauthorised persons cannot access that file even having stolen the hard disk. Several “hidden disks” of such kind may be created, each of which may be accessed by the several users. These users are being identified having connected to the computer with their personal electronic keys. The back-up copies are written to the storage devices (floppies, CDs) in an encrypted format. Using this solution the data security is guaranteed even in the case of violence. If an employee is forced to enter the password, he or she will enter a special password created for the like cases. After the employee enters that password, the computer will imitate the errors in the system. Afterwards the system will destroy the “hidden disk” and the criminal having even entered the right password will not be able to access the data. And you will be able to restore the data from the back-up devices anytime. Thus, by the means of this data security complex your company’s important and confidential data will always be safe.
Šaltinis: Penki kontinentai
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Cash Management.iQ and S&G’s A-Series ATM Locks. Manage CIT access to ATMs and other terminal devices

Automating the process of assigning tasks and providing relevant access to CIT personnel is one of the most useful ways in increasing the overall efficiency of the cash flow process. BS/2 was able to implement these features into it’s Cash Management.iQ system while finalizing the main phase of the integration process of the Cash Management.iQ platform with the A-Series access control solution from Sargent&Greenleaf. more »

TransLink.iQ and Ingenico terminals for Azer Turk Bank

The Azerbaijani state-owned bank Azer Turk Bank has purchased a TransLink.iQ solution for EFTPOS networks monitoring and managing, developed by ASHBURN International. The company also provided the bank with the country's first payment terminals manufactured by Ingenico. more »

BS/2 Provides a Full Maintenance Service On Banking Equipment Even During Quarantine

Due to the rapid global coronavirus disease spread, the WHO announced the COVID-19 outbreak a pandemic on March 11. Most countries have introduced quarantine and recommended their citizens to isolate themselves from social contact. Schools, kindergartens, shops, cafes, restaurants and other public gathering places were closed. Many companies let their employees work from home. more »

Remote Cash Capture. New opportunities during the COVID-19 pandemic

The demand for solutions helping to increase the autonomy of banks and retail chains work will go up. This opinion was expressed by the head of "Infoline-Analytics" Mikhail Burmistrov in the Kommersant.ru article "Networks distance themselves from collectors". This also applies to remote cash capture solutions. more »

Penki Kontinentai Supports Social Initiatives during the COVID-19 Pandemic

Penki Kontinentai expresses gratitude to all socially responsible citizens, volunteers, and business representatives, who help physicians, the elderly and other vulnerable groups during the COVID-19 coronavirus pandemic. The Group of companies, in turn, allocated 50 thousand euros to support public organizations in Lithuania. more »

Penki offers 16 free TV channels

Fiber-optic network Penki has expanded its list of free TV channels to diversify the leisure time of its customers during the quarantine period. more »

Do Employees Work From Home? Review Company's Information Security Policy

Due to the introduction of quarantine in Lithuania because of the threat of the COVID-19 spread, the government recommended companies to move employees to remote mode. Work from home has many advantages, but at the same time raises many questions, especially in the field of information security. more »

Penki Kontinentai Group Transitions to Remote Work

Following the decision of the Lithuanian government on a two-week nationwide quarantine due to the spread of COVID-19, the Penki Kontinentai Group transitions some areas of its activities to the remote format. more »

TransLink.iQ - The Object of a New Study by Takhmasib Dadashev

The software solution for monitoring and managing EFTPOS-terminal networks TransLink.iQ will be the subject of a new study by Takhmasib Dadashev. more »