Data security “Stealth disk” – for the successful business

At the exhibition “Infobalt 2003” Penki kontinentai, UAB Internet and telecommunications centre will present a complex data security solution. You are welcome to visit the stand of the company S1.14. Nowadays having lost the confident information you are risking to loose money. Penki kontinentai offers the companies to use the up-to-date data security means in order to prevent the data from the competitive or criminals. Company’s local network and the personal computer of each employee can be effectively protected from the unauthorised persons by means of the specialised software and devices. “Stealth disk” is a complex data security solution. “Security IT” software and “Aladdin” electronic keys “e- Token” are used for the implementation thereof. The electronic key is a device, which stores an encrypted password; it is as small as the usual door key. Accessing his or her computer or the data stored in the local network an employee connects the electronic key to the computer’s USB port and enters the password once again. The confidential data is stored at so-called “hidden disk” in an encrypted format. The “hidden disk” is created as the file at the computer’s hard disk. The unauthorised persons cannot access that file even having stolen the hard disk. Several “hidden disks” of such kind may be created, each of which may be accessed by the several users. These users are being identified having connected to the computer with their personal electronic keys. The back-up copies are written to the storage devices (floppies, CDs) in an encrypted format. Using this solution the data security is guaranteed even in the case of violence. If an employee is forced to enter the password, he or she will enter a special password created for the like cases. After the employee enters that password, the computer will imitate the errors in the system. Afterwards the system will destroy the “hidden disk” and the criminal having even entered the right password will not be able to access the data. And you will be able to restore the data from the back-up devices anytime. Thus, by the means of this data security complex your company’s important and confidential data will always be safe.