Data security “Stealth disk” – for the successful business

Published: 20 October 2003 y., Monday
At the exhibition “Infobalt 2003” Penki kontinentai, UAB Internet and telecommunications centre will present a complex data security solution. You are welcome to visit the stand of the company S1.14. Nowadays having lost the confident information you are risking to loose money. Penki kontinentai offers the companies to use the up-to-date data security means in order to prevent the data from the competitive or criminals. Company’s local network and the personal computer of each employee can be effectively protected from the unauthorised persons by means of the specialised software and devices. “Stealth disk” is a complex data security solution. “Security IT” software and “Aladdin” electronic keys “e- Token” are used for the implementation thereof. The electronic key is a device, which stores an encrypted password; it is as small as the usual door key. Accessing his or her computer or the data stored in the local network an employee connects the electronic key to the computer’s USB port and enters the password once again. The confidential data is stored at so-called “hidden disk” in an encrypted format. The “hidden disk” is created as the file at the computer’s hard disk. The unauthorised persons cannot access that file even having stolen the hard disk. Several “hidden disks” of such kind may be created, each of which may be accessed by the several users. These users are being identified having connected to the computer with their personal electronic keys. The back-up copies are written to the storage devices (floppies, CDs) in an encrypted format. Using this solution the data security is guaranteed even in the case of violence. If an employee is forced to enter the password, he or she will enter a special password created for the like cases. After the employee enters that password, the computer will imitate the errors in the system. Afterwards the system will destroy the “hidden disk” and the criminal having even entered the right password will not be able to access the data. And you will be able to restore the data from the back-up devices anytime. Thus, by the means of this data security complex your company’s important and confidential data will always be safe.
Šaltinis: Penki kontinentai
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Penki Kontinentai Revenue for the First Quarter of 2019 - 10.9 Million Euros

The revenue of the Penki Kontinentai Group, specializing in innovative information technology solutions, reached 10.9 million euros for the first quarter of 2019, which is 25 percent more than in the same period last year (8.7 million euros). more »

Vilius Gofmanas about Business Trip to Nigeria

In the beginning of May, BS/2 Software Sales Manager Vilius Gofmanas and Head of IT Solutions Support Department Sergej Pokusajev visited Lagos, the largest city in Nigeria. more »

Automated Сurrency Exchange Points for Ipak Yuli Bank

In recent years, the banking sector pays more attention to self-service. more »

Incredible Price for Interactive IPTV During Summer

With the onset of summer, Penki fiber optic network presents a special offer for regular and future customers: interactive IPTV during the summer months - only for 1 €/month. more »

Legendary Vertical Race to 31st Floor of Business Center “Europe” Revived

After a long break, the legendary vertical race to the 31st floor of the highest business center in the Baltic countries took place in Vilnius on May 18. more »

Penki Kontinentai Has Published Book on Cash Circulation

Recently, the Penki Kontinentai Group has published the book “Modern video security platforms in the banking industry” by Takhmasib Dadashev, and today we can already get acquainted with his other work. more »

Europe Cash Cycle Seminar: Cash Cycle Evolution and Strategy

The International Commercial Cash Operations Seminar is one of the most respected forums that brings together cash flow management professionals from commercial and national banks. more »

How to deploy seamless payment infrastructure across ATM and kiosk fleets

ATMs were designed as simple cash withdrawal terminals. However, with the creation of first multifunctional self-service devices with the deposit function, the role of the banking self-service channel had to be reconsidered. more »

Vladimir Nazarenko about S&G Plans for 2019 and Partnership with BS/2

Sargent and Greenleaf (S&G), one of the world's leading manufacturers of safe locks and security systems has been present on the market for over 160 years. more »