Data security “Stealth disk” – for the successful business

Published: 20 October 2003 y., Monday
At the exhibition “Infobalt 2003” Penki kontinentai, UAB Internet and telecommunications centre will present a complex data security solution. You are welcome to visit the stand of the company S1.14. Nowadays having lost the confident information you are risking to loose money. Penki kontinentai offers the companies to use the up-to-date data security means in order to prevent the data from the competitive or criminals. Company’s local network and the personal computer of each employee can be effectively protected from the unauthorised persons by means of the specialised software and devices. “Stealth disk” is a complex data security solution. “Security IT” software and “Aladdin” electronic keys “e- Token” are used for the implementation thereof. The electronic key is a device, which stores an encrypted password; it is as small as the usual door key. Accessing his or her computer or the data stored in the local network an employee connects the electronic key to the computer’s USB port and enters the password once again. The confidential data is stored at so-called “hidden disk” in an encrypted format. The “hidden disk” is created as the file at the computer’s hard disk. The unauthorised persons cannot access that file even having stolen the hard disk. Several “hidden disks” of such kind may be created, each of which may be accessed by the several users. These users are being identified having connected to the computer with their personal electronic keys. The back-up copies are written to the storage devices (floppies, CDs) in an encrypted format. Using this solution the data security is guaranteed even in the case of violence. If an employee is forced to enter the password, he or she will enter a special password created for the like cases. After the employee enters that password, the computer will imitate the errors in the system. Afterwards the system will destroy the “hidden disk” and the criminal having even entered the right password will not be able to access the data. And you will be able to restore the data from the back-up devices anytime. Thus, by the means of this data security complex your company’s important and confidential data will always be safe.
Šaltinis: Penki kontinentai
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Intersect 2019. Experience and Prospects of the Global Banking Industry

Bank branches will not disappear in the near future. This opinion was expressed by Gerrard Schmid, the president of Diebold Nixdorf, at the opening ceremony of the three-day Intersect 2019 conference in Las Vegas, which was also attended by representatives of Penkių kontinentų bankinės technologijos (BS/2), a part of the Penki Kontinentai Group. more »

ProfIT Launches New Website

Penkių kontinentų komunikacijų centras, offering ProfIT outsourcing IT services, presents its updated website to its business partners. more »

Future Retail. Diebold Nixdorf Partner Summit

Recent trends and changes in the industry have become key topics of discussion at the partner summit of Diebold Nixdorf, worldwide leader in banking and retail solutions. more »

Lithuanians Opt For High-Speed Fiber Optic Internet and IPTV

According to the Lithuanian Communications Regulatory Authority, the number of fiber optic Internet users in the country is constantly growing. more »

New Payments.iQ opportunities for monitoring the stream of transactions

BS/2 has released an update for the Payments.iQ software solution. The new version of the software introduces a fundamentally new approach to organizing workstations for different groups of users of the platform. more »

12 regional medical institutions in Lithuania have entrusted „ProfIT“ with the maintenance of their virtual servers

„Penkių kontinentų komunikacijų centras“, which offers „ProfIT“ outsourcing IT solution for business, has signed a joint agreement on information system infrastructure maintenance with 12 Lithuanian medical institutions. more »

ATM security: how to use all the capabilities of video surveillance

According to the European Safe Transaction Association (EAST), in 2018 the number of physical attacks on ATMs in Europe increased by 27% (from 3,584 to 4,449 incidents), and the amount of money stolen this way increased by 16% (from 31 to 36 million Euro). more »

Only for Students! Special Price of the Fastest Internet

The Penki fiber optic network offers Vilnius students to prepare for the academic year in advance and take care of the most convenient way to get information in the modern world - fast Internet. more »

CIT bags inventory management. New Cash Management.iQ feature

Comprehensive cash management involves centralized cash availability monitoring and demand forecasting for each connected cash points. more »

ADM. When And How Banks Can Use The Remote Cash Capture

Remote Cash Capture is one of the main trends of recent years for retail cash management. more »