Data security “Stealth disk” – for the successful business

Published: 20 October 2003 y., Monday
At the exhibition “Infobalt 2003” Penki kontinentai, UAB Internet and telecommunications centre will present a complex data security solution. You are welcome to visit the stand of the company S1.14. Nowadays having lost the confident information you are risking to loose money. Penki kontinentai offers the companies to use the up-to-date data security means in order to prevent the data from the competitive or criminals. Company’s local network and the personal computer of each employee can be effectively protected from the unauthorised persons by means of the specialised software and devices. “Stealth disk” is a complex data security solution. “Security IT” software and “Aladdin” electronic keys “e- Token” are used for the implementation thereof. The electronic key is a device, which stores an encrypted password; it is as small as the usual door key. Accessing his or her computer or the data stored in the local network an employee connects the electronic key to the computer’s USB port and enters the password once again. The confidential data is stored at so-called “hidden disk” in an encrypted format. The “hidden disk” is created as the file at the computer’s hard disk. The unauthorised persons cannot access that file even having stolen the hard disk. Several “hidden disks” of such kind may be created, each of which may be accessed by the several users. These users are being identified having connected to the computer with their personal electronic keys. The back-up copies are written to the storage devices (floppies, CDs) in an encrypted format. Using this solution the data security is guaranteed even in the case of violence. If an employee is forced to enter the password, he or she will enter a special password created for the like cases. After the employee enters that password, the computer will imitate the errors in the system. Afterwards the system will destroy the “hidden disk” and the criminal having even entered the right password will not be able to access the data. And you will be able to restore the data from the back-up devices anytime. Thus, by the means of this data security complex your company’s important and confidential data will always be safe.
Šaltinis: Penki kontinentai
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Payment terminals for Lietuvos geležinkeliai

As part of the payment automation project, Lietuvos geležinkeliai acquired about 100 Ingenico mobile payment terminals from ASHBURN International, a company specializing in software solutions for EFTPOS terminals. more »

ATMeye.iQ Will Ensure ATM Safety in Turkey

BS/2 in cooperation with Analistim Bilisim expands its area of operation and enters the Turkish market with ATMeye.iQ – the ATM software solution, which helps protect banking equipment, resolve disputes and prevent fraud. more »

Lietuvos paštas continues cooperation with ASHBURN International

Lietuvos paštas, the largest Lithuanian postal service provider, extended the cooperation agreement with ASHBURN International, which develops and implements software solutions for authorization of payment cards and network management of EFTPOS terminals, for another two years. more »

Face Detection: Extra ATM PIN Security

One of the most common cases of financial losses for bank customers is still an ordinary theft of a card and PIN code. How can banks protect customers from PIN theft? more »

How Banking Self-service in Uzbekistan is changing - the Main Banking Fusion 2019 Conference Insights

The Banking Fusion 2019 conference showed that currently Uzbekistan is ready for change, to implement and use innovations in the banking industry. more »

ATMs or Automated Deposit Machines. What is a better solution for remote cash capture?

Despite the significant increase of non-cash payments, trade and service enterprises (TSPs) still remain points of mass cash storage. Merchants turn to remote cash capture to make sure the cash collected from registers isn‘t being held up at cash points and isn‘t delaying the cash flow process. more »

Innovative Restaurant Chain Prefers ProfIT Services

Inovatyvūs restoranai, which owns eight restaurants in Vilnius and plans to expand the geography outside Lithuania - in Russia and Poland, has chosen ProfIT outsourcing services provided by Penkių kontinentų komunikacijų centras. more »

Banking Fusion Conference in Tashkent: The main trends of self-service banking

The International conference Banking Fusion 2019 dedicated to the development of self-service banking channels was held in Tashkent from November 26 to 27. The event brought together about 100 representatives of the financial industry from Uzbekistan, Kazakhstan, Kyrgyzstan, Tajikistan, Azerbaijan, Georgia, Russia, Belarus, Germany, Lithuania, and Switzerland to discuss how the world of self-service banking has changed in recent years and how this affects the banking industry. The conference was organized by Penkių kontinentų bankinės technologijos (BS/2) and supported by the Uzbekistan Banking Association, Diebold Nixdorf and Sargent&Greenleaf. more »

Penki donated over 1000 network devices to Lithuanian schools

Penkių kontinentų komunikacijų centras, the company managing the Penki fiber optic network, has been providing unused equipment to educational institutions as part of a social campaign. This fall, more than 1,000 switches and routers were donated to Lithuanian educational institutions. more »

How to Manage Cash Circulation: Technological Innovations of the Industry Were Discussed In Tashkent

International Conference “Cash Circulation, Collection and Cash Operations in the Bank“ was held in Tashkent from November 12 to 13. The event became a platform where bank managers, vendors, banking solutions developers and suppliers met to discuss current industry issues. Over 140 representatives of the banking industry from the CIS countries, Europe and the Central Asian region attended the conference. more »