SecureIT
Return to Introduction  Previous  Next

SecureIT is the simplest and easiest way to secure and protect data.  
 
Click here to download a fully functional 30 day trial version of Secure IT  
 
bullet Based on highly secure, open source, tried and tested AES and Blowfish algorithms  
AES is the new official US government standard for encryption of data. Blowfish is known to be one of the strongest algorithms in existence and requires relatively little computing power (practically, a 1 MB file can be encrypted in 3 seconds or less on most desktops)  
 
bullet Impossible to break  
AES at 128 bits is certified by NIST (National Institute of Standards and Technologies) to take 149 trillion years to break. (Using a machine that takes one second to crack a 56 bit DES key). Secure IT uses AES at 256 bits, making it practically impossible to break.  
 
bullet Built in file shredder  
i.e. wiping the contents of the original pre-encrypted file beyond recovery to make sure that not even a trace remains after shredding. (Matching and exceeding the specifications of the U.S. Department of Defense)  
 
bullet No "back doors" in the software  
No access possible under any circumstances. If you do not enter the correct password you cannot access the encrypted contents. There is no special procedure, secret code, or hidden entry method to fall back on.  
 
bullet Encrypt every kind of file  
All file types, whether spreadsheet, graphic, word processor or others, on every kind of medium, whether floppy disk, removable hard drive, zip drive, tape drive or other.  
 
bullet Secure E-mail  
Ability to make self-extracting e-mail attachments, which can be sent to people who do not have Secure IT. The program can be used to create self-extracting files. The recipient can unlock the data by just starting the self-extracting file within Windows and entering the password. The only requirement for self-extracting files is that the recipients must be running some form of Microsoft Windows. All they need is the password to access the contents i.e. a totally secure system is possible without any modification to the existing mail system. The only requirement is that the mail system must support file attachments.  
 
bullet Intuitive interface  
to minimize the learning curve, and make using the product easy to use.  
 
bullet Transparent to the end user  
Designed to hide the complexities of encryption technology from the end user.  
 
bullet Command Line Options  
Secure IT allows to encrypt and decrypt files from the Command Line. You can group a series of encryption and decryption commands in a single or multiple batch files and run it to get the desired results.  
 
Click here to download a fully functional 30 day trial version of Secure IT