G+

Cybersafe Top Secret. Features

Cybersafe Top Secret: encryption software

Certificate-Based Encryption

Certificate-Based Encryption

CyberSafe Top Secret’s file encryption system is based on certificates, which are electronic digital identifiers containing a pair of public and private user keys for each of the relevant cryptoproviders (Open SSL, Open PGP), as well as certificates in the X.509 and PKC#12 formats, which are used for encrypting email.

Each personal user certificate is unique in that it is issued to a particular email address.

Hard Drive Encryption

Hard Drive Encryption and Virtual Volume Creation

CyberSafe Top Secret allows you to protect all the data on a hard drive, whether that be from a computer, a laptop, an external hard drive, or a USB flash drive, as well as to create separate encrypted partitions of any size on these drives. Only the file system of NTFS is supported

Virtual Volume Creation

Using this, you can create virtual encrypted disks and store confidential information on them in an encrypted format, while at the same time all the other information on your computer will be unencrypted and available for use.

E-mail Encryption

E-mail Encryption

CyberSafe Top Secret gives you the ability to protect electronic correspondence when working with any e-mail client (Microsoft Outlook 2007/2010/2013/2016, Thunderbird, The Bat!, etc.), and also when using mobile devices using iOS or Android. E-mail encryption is carried out on the basis of certificates in the X.509 and PKCS#12 formats. Step-by-step instructions on features of encryption control are provided in User’s Guide on the program site.

CyberSafe Top Secret is compatible to all e-mail clients which support certificates of S/MIME. If the program is incompatible with your e-mail client, we will refund means.

Hiding files and folders

Hiding files and folders

CyberSafe Top Secret allows you to hide both separate folders with files and entire logical disks from the operating system. The hidden elements remain invisible when booting the computer in safe mode, when being viewed via a remote administration program, and also if CyberSafe is uninstalled from the computer. The hiding function is combined with encryption, providing the greatest possible protection for confidential information.

Considering possibilities of the CyberSafe Top Secret, we declare that it exceeds PGP Desktop and TrueCrypt.

Full list of features:

  • Creation, import, export certificates
  • Publication of certificates
  • Encrypting files for transfer
  • Create SFX-packets with encrypted files
  • Transparent folder encryption
  • Trusted application system
  • Cloud encryption
  • Decrypting of files
  • Electronic signature files
  • Check the electronic signature
  • Encrypting and hiding drives
  • Virtual cryptocontainers

Get download link

We can give you some ideas about keeping your data safe. Sign up for our newsletter, or activate the checkbox and leave the fields blank.