Protect your files against illegal access with the abylon CRYPTDRIVE. The encrypted drives can be open (mount) with passwords, EC-MoneyCard, Health Insurance Card or Certificate Smartcard (PKCS) and use like a normal drive in the File Explorer.
abylon READER 5.5 The encrypting with the software of abylonsoft is not an one-way. The free READER-Version verify, decrypt and unpack SME files. The functions are offered simply by the right mouse button of the File Explorer.
abylon LOGON 5.5 Protect your computer with abylon LOGON, the simple and flexible logon for Windows NT, 2000 or XP. You can register any certificate smartcard, an USB-Token or alternatively also an 'EC MoneyCard' (with chip) and 'Health Insurance Card'.
Description: Protect your data against illegal access. The abylon CRYPTDRIVE save your files in one or more image file encrypted with Blowfish (key size 448 bit) or AES (key size 256 bit). Only if the virtual drive is opened (mount), it is shown in the File Explorer and can be use like normal. Until every file operation the encryption and decryption occurs automatically in the background without noticeable delay. The access rights onto the individual abylon CRYPTDRIVE occurs about passwords (SYMM-System) or through the assignment of X.509 certificates (HYBRID-System, PKCS, RSA). In case of the HYBRID-System a simple administration of the authorizations is possible through the use of certificates. So only the management have an access to the encrypted data and the problem of the omniscient administration is not more given. Per client can be create up to 10 abylon CRYPTDRIVES with 'nearly' unlimited (tested up to 32 GB) size. The memory location of the drive images can be on the local client or a network sever (UNC-path). In each case the decryption occurs only on the client.
USB Token Checks Out PCs Returning to the Office With more corporate workers than ever working at home or in secondary locations at least part time, many enterprise security managers find themselves at a loss to control the security and integrity of the machines their users work on.