Webshop Webshop | View shoppingcart

SafeIT Security Office Pro USB

A high security Office package with pop3/smtp E-MAIL ENCRYPTION, FILE ENCRYPTION, FILE SHREDDING and SECURE DISK ENCRYPTION in one easy-to-use product. A powerful fully automatic security suite for all your privacy needs. The Pro USB version is installed with a one year encrypted USB license key with personal PIN code, unlimited e-mail accounts and several encryption algorithms.



Download Demo

Add to cart:
Add




 


Main features in software include:
Recent public exposure of FBI's "Carnivore" e-mail snooping program and the global digital surveillance system Echelon has highlighted what has been known for a long time - everything you transmit by e-mail can be intercepted and used by others. External industrial espionage, hacker attacks or internal information theft, are all urgent threats that you need to protect yourself against.

If your computer is under attack, gets stolen or is lost, someone else can gain access to all unprotected files and digital information stored on it. However if you protect your computer with encryption software, your sensitive information is protected against any intrusion into your computer. The only way to gain access to encrypted files is through the password that you alone hold, to unlock the encryption.

Did you know that all of the information and files that you once had saved on your computer, remain on your computer, even after you think you have deleted them. This means that someone else can recreate the files that you think you had already deleted. The only true way to permanently remove unwanted files and data is to use file shredding software. File shredding utilizes an advanced algorithm technique of overwriting your files multiple times so that the information contained in them is no longer readable, thus destroying the original data forever.

How does SafeIT Security Office Commercialprotect your sensitive information?
The encryption technology used in this product suite supports several encryption algorithms, including the new AES-standard, and key lengths from 256-480 bits. SafeIT shredding technology supports both The Department of Defence (DoD) shredding algorithm as well as the established "Gutman" algorithm.

SafeIT Security Office provides you with three user friendly, easy to install products in one all encompassing suite: SafeIT E-mail Encryption for secure emails; SafeIT Desktop Security for protection of your sensitive files and permanent removal of sensitive information; and SafeIT Secure Disk for securing information on your computer.

The price per license includes one full year of free support and automatic upgrades from SafeIT.

SafeIT E-mail Encryption
Automatic establishment of secure e-mail communication between SafeIT E-mail Encryption users.
SafeIT E-mail Encryption allows you to continue using your regular e-mail client, no need to change your current email set-up.
All of the email you send, including attachments, will be encrypted before leaving your computer.
SafeIT E-mail Encryption guarantees point-to-point user-to-receiver secure communication. At no time, during the transfer of your email, can your information be accessed or modified.
The software also includes SafeIT Express, which allows you to easily send password encrypted secure e-mails to counterparts that are not using SafeIT E-mail Encryption, including web-mail users.

SafeIT File Encryption
SafeIT File Encryption supports several encryption algorithms including the new AES standard.
The software allows you to easily select a file to be encrypted by using a simple right click.
The software supports multiple encryption of selected files. i.e. encrypt a file more than once and use different combinations of passwords and encryption algorithms.
The software includes full shredding functionality and always offers you the opportunity to shred the original file when you choose to encrypt.
Create self extracting encrypted files that can be sent to someone that does not have the software installed. Only the correct password is needed to unlock encrypted information.
Take advantage of the Free SafeIT Encryption Reader for installation on other computers where you only need to be able to decrypt information.

SafeIT File Shredding
The software allows you to easily select a file to be shredded by using a simple right click or browse for a file or folder.
Choose to shred everything in your recycle bin with an easy click.
Drag and drop files to your "SafeIT File Shredding bin" on the desktop. They will be instantly shredded.
Take control over all your temporary files left behind on your computer. Shred all temporary files by selecting this option in the program window.
Use the "Shred all free space guide" to clean your computer from all old deleted files and folders that are still stored on your drives. You can not see them but you can easily recreate them!
The software includes qualitative reporting as an option, if you need to document that sensitive client files have been permanently removed for example.

Find out more about how to use this software by downloading the free 30 day demo version or by looking into the user manual.

1 year of free upgrades and free support included in the price!

SafeIT Secure Disk
The program makes a part of your current hard disk a secure disk. All private and confidential information stored on this disk will be protected using strong encryption.

Your secure disk is only accessible by entering the correct password. The program is easy to install and the step-by-step guides will walk you through the process of creating your own secure disk. After installation, the user friendly interface makes securing a file as easy as copying it.

System Requirements
Microsoft Windows XP, Windows 2000, Windows NT or Windows 98SE
15 MB free disk space
10 MB free RAM
An e-mail program and an e-mail address supporting the SMTP/POP3-protocols (e.g. Microsoft Outlook, Outlook Express, Netscape, Eudora, Opera).

Security Technology
Symmetric encryption algorithms: New AES-standard Rijndael (256 bits), Blowfish (448 bits), Twofish (256 bits), SafeIT-algorithm (480 bits).
Asymmetric encryption algorithm: Diffie-Hellman Key Exchange Protocol.
Hash-algorithm: MD5
PRNG: Isaac
Automatic random key generation and constant exchange of encryption keys.
Unique encryption keys used for each e-mail sent.