Webshop Webshop | View shoppingcart
SafeIT Desktop Security Suite

Get both the awarded SafeIT File Encryption and SafeIT File Shredding in one powerful suite, including addin for high secure encryption of excel and word documents when sending the documents to e-mail clients.

Download Demo

Data Sheet
Technical Whitepaper

Add to cart:

Main features in software include:

Supports several encryption algorithms including the new AES standard.
The software allows you to easily select a file to be encrypted by a simple right click, browse for a file or drag and drop functionality.
The software supports multiple encryption of selected files i.e. encrypt a file more than once and use different combinations of passwords and encryption algorithms.
The software includes full shredding functionality and always offers you the opportunity to shred the original file when you choose to encrypt.
Create self extracting encrypted files that can be sent to someone that does not have the software installed. * Only the correct password is needed to unlock encrypted information.
Take advantage of the Free SafeIT Encryption Reader for installation on other computers where you only need to be able to decrypt information.
Chose to shred everything in your recycle bin with an easy click.
Drag and drop files to your "SafeIT File Shredding bin" on the desktop. They will be instantly shredded.
Take control over all your temporary files left behind on your computer, Shred all temporary files by selecting this option in the program window.
Use the "Shred all free space guide" to clean your computer from all old deleted files and folders that are still stored on your drives. You can not see them but you can easily recreate them!
The software includes qualitative reporting as an option, if you need to document that sensitive client files have been permanently removed for example.

Find out more about how to use this software by downloading the free 30 day demo version or by looking in the user manual.

Why Encryption?
You should encrypt sensitive files on all computers used in your home or your organization, especially lap-tops that are carried around and connected into other networks. The following examples highlight a few security situations in need of file encryption:

Where more than one user has access to a PC with personal or confidential information (not forgetting support personnel or colleagues) or where the data is held on a LAN.
Where information is to be transmitted via e-mail, USB-memory, flash-
memory or floppy disk.
As an additional measure where a PC already incorporates an access control mechanism. Encryption secures the data itself, which will remain encrypted even if the PC is lost, stolen or accessed by someone that bypasses the log-in barrier.
If you are connected to the Internet and fear that someone might break into your computer. Encryption software makes sure that sensitive and personal files are protected from unlawful access.

Why Shredding?
Did you know that all of the information and files that you once had saved on your computer, remain on your computer, even after you think you have deleted them.

SafeIT File Shredding allows you to completely remove selected stored information on your hard drive and other memories. When you delete a file, empty your Recycle Bin or even format your hard disk, the information is NOT removed from your computer. These commands only alter the structure of the drive, leaving most of the data intact and recoverable with software tools easily available. This means that someone else can recreate the files that you think you have already deleted. The only true way to permanently remove unwanted files and data is to use file shredding software. File shredding utilizes an advanced algorithm technique of overwriting your files multiple times so that the information contained in them is no longer readable, thus destroying the original data forever.

The shredding technology used in this product suite supports both The Department of Defence (DoD) shredding algorithm, using 7 rounds of overwriting, as well as the established "Gutman" algorithm with its 35 rounds of overwriting.

SafeIT Desktop Security is a user friendly, easy to install software that allows you to permanently remove sensitive information from your computer such as documents, files, photographs, movie clips etc.

System Requirements
Microsoft Windows XP, Windows 2000, Windows NT or Windows 98SE
15 MB free disk space
10 MB free RAM
Security Technology
The SafeIT Technology is based on well known standards and approved algorithms for. The program has support for the following overwriting algorithm:

New AES-standard Rijndael, 256 bits
Blowfish, 448 bits
Twofish, 256 bits
SafeIT-algorithm, 480 bits
Hash-algorithm: MD5
HMG Infosec Standard 5, The Baseline Standard. The algorithm using 1 pass of overwriting.
HMG Infosec Standard 5, The Enhanced Standard. The algorithm using 3 passes of overwriting.
Peter Gutmann's algorithm. The algorithm using 35 passes of overwriting.
U.S.Department of Defense Sanitizing (DOD 5220.22-M). The algorithm using 3 passes of overwriting.
Bruce Schneier's algorithm. The algorithm using 7 passes of overwriting.
Navy Staff Office Publication (NAVSO P-5239-26) for RLL. The algorithm using 3 passes of overwriting.
The National Computer Security Center (NCSC-TG-025). The algorithm using 4 passes of overwriting.
Air Force System Security Instruction 5020. The algorithm using 4 passes of overwriting.
US Army AR380-19. The algorithm using 3 passes of overwriting.
German Standard VSITR. The algorithm using 3 passes of overwriting.
OPNAVINST 5239.1A. The algorithm using 3 passes of overwriting.