Webshop Webshop | View shoppingcart

SafeIT Security Office Light

A high security Office package with pop3/smtp E-MAIL ENCRYPTION, FILE ENCRYPTION, FILE SHREDDING and SECURE DISK ENCRYPTION in one easy-to-use product. A powerful fully automatic security suite for all your privacy needs. The Light version is installed with a one year license key for one e-mail account and one encryption algorithm.



Download Demo

Add to cart:
Add


 


SafeIT Security Office Light

The SafeIT Security Office Light encryption technology used in this light product suite supports one encryption algorithm, the high security SafeIT algorithm with 480 bit symmetric encryption key. SafeIT shredding technology supports the Department of Defence (DoD) shredding algorithm, the established "Gutman" algorithm and several other known shredding algorithms. The SafeIT Security Office Light is installed with the high Secure one year encrypted license key, also available as a 30 days demo version. When the SafeIT Security Office Light is installed , the user can chose to install the 30 days demo version if the registration form at the start up of the new installed program is not filled in. In order to use the SafeIT Security Office Light version as a one year license , the payment of the license has to be done with a reference to an e-mail address which shall be used for the e-mail encryption. This e-mail address shall be reported to Ardy Electronics Ltd (www.safeit.ae) and when we have registered the e-mail address in our database, you will be able to register your SafeIT Security Office Light license online by filling in the registration form. After this is done, your SafeIT Security Office Light version will be valid one year from the date of registration on our web site (www.safeit.ae). After the date of expire of the SafeIT Security Office Light version license , the program suite will only decrypt information and e-mails until the license is renewed.

E-mail Encryption

Recent public exposure of FBIs "Carnivore" e-mail snooping program and the global digital surveillance system Echelon has highlighted what has been known for a long time - everything you transmit by e-mail can be intercepted and used by others. External industrial espionage, hacker attacks or internal information theft, are all urgent threats that you need to protect yourself against. The award-winning SafeIT E-mail Encryption is the leading program for user-friendly secure e-mail communication. The encryption technology used, supports several encryption algorithms, including the new AES-standard, and key lengths from 256-480 bits. Choose automatic encryption between SafeIT users or use SafeIT Express to send secure e-mail to any receiver. The price per license includes one full year of free support and automatic upgrades from SafeIT.

File Encryption and File Shredding

SafeIT File Encryption keeps your confidential and valuable information from getting into the wrong hands. You should encrypt sensitive files on all computers used in your home or your organization, especially laptops that are carried around and connected into other networks. The following examples highlight a few security situations in need of file encryption:

SafeIT File Shredding allows you to completely remove selected stored information on your hard drive and other memories. When you delete a file, empty your Recycle Bin or even format your hard disk, the information is NOT removed from your computer. These commands only alter the structure of the drive, leaving most of the data intact and recoverable with software tools easily available. This means that someone else can recreate the files that you think you have already deleted. The only true way to permanently remove unwanted files and data is to use file shredding software. File shredding utilizes an advanced algorithm technique of overwriting your files multiple times so that the information contained in them is no longer readable, thus destroying the original data forever.

Hard Disk Encryption

Your secure disk is only accessible by entering the correct password. The program is easy to install and the step-by-step guides will walk you through the process of creating your own secure disk. After installation, the user friendly interface makes securing a file as easy as copying it.

System Requirements
Microsoft Windows XP, Windows 2000, Windows NT or Windows 98SE
15 MB free disk space
10 MB free RAM