CyberSafe Enterprise. Practice
CyberSafe Enterprise: encryption software for companies
Using CyberSafe Enterprise, the System Administrator can configure transparent network folders encryption feature without using additional data security protocols and in the sequel manage user’s access to one or other encrypted folder.
To configure transparent encryption feature users who will work with encrypted files have to have CyberSafe Enterprise installed on their computers, their Personal Certificates must be created and their Public Keys must be published on the CyberSafe Keyserver.
Next, the System Administrator creates a new folder on a remote server, adds it to the program and assigns the keys of the users who will be able to work with encrypted files in this folder.
It is possible to create as many folders as needed, keep in different folders confidential information of varying degrees of importance and System Administrator at any time can remove a user from the list or add a new one.
Before use of the program we recommend to read a manual:
Transparent file encryption on a PC using Cybersafe File Encryption
We’ve added a “transparent file encryption” function to the new version of CyberSafe. In this article, I’ll describe how this function works and its basic abilities, as well as its advantages over EFS, the standard data encryption system of windows.
Transparent encryption: pros and cons
In this article, we are going to tell about transparent encryption implemented by means of CyberSafe Enterprise software. Along with this program, we shall demonstrate how to decrypt files encrypted with EFS….
Cryptocontainer vulnarabilities for remote attacks
At present, cryptocontainers are used to store confidential information both on user’s PCs and in corporate environment of businesses and institutions; they can be created with almost any encrypting software. Cryptocontainers are so widespread because they are convenient in handling encrypted files and offer opportunity to implement on-the-fly encrypting.
Crypto containers vulnerabilities
One of the most convenient solutions to encrypt files is the creation of virtual encrypted volumes, which are also called crypto containers. However, not everyone is aware of the shortcomings of this method and that mismanagement of their use may do more harm than good.