SecureIT

Return to Introduction  Previous  Next

SecureIT is the simplest and easiest way to secure and protect data.

 

Bullet Based on highly secure, open source, tried and tested AES and Blowfish algorithms

AES is the new official US government standard for encryption of data.  Blowfish is known to be one of the strongest algorithms in existence and requires relatively little computing power (practically, a 1 MB file can be encrypted in 3 seconds or less on most desktops)

 

Bullet Impossible to break

AES at 128 bits is certified by NIST (National Institute of Standards and Technologies) to take 149 trillion years to break. (Using a machine that takes one second to crack a 56 bit DES key).  Secure IT uses AES at 256 bits, making it practically impossible to break.

 

Bullet Built in file shredder

i.e. wiping the contents of the original  pre-encrypted file beyond recovery to make sure that not even a trace remains after shredding. (Matching and exceeding the specifications of the U.S. Department of Defense)

 

Bullet No "back doors" in the software

No access possible under any circumstances.  If you do not enter the correct password you cannot access the encrypted contents. There is no special procedure, secret code, or hidden entry method to fall back on.

 

Bullet Encrypt every kind of file

All file types,  whether spreadsheet, graphic, word processor or others, on every kind of medium, whether floppy disk, removable hard drive, zip drive, tape drive or other.

 

Bullet Secure E-mail

Ability to make  self-extracting e-mail attachments, which can be sent to people who do not have Secure IT. The program can be used to create self-extracting files. The recipient can unlock the data by just starting the self-extracting file within Windows and entering the password. The  only requirement  for  self-extracting  files is  that  the  recipients  must  be  running  some form of Microsoft  Windows. All  they  need  is  the password  to  access  the contents i.e. a totally secure system is possible without any  modification to the existing  mail system. The only requirement is that the mail system must support file attachments.

 

Bullet Intuitive interface

to minimize the learning curve, and make using the product easy to use.

 

Bullet Transparent to the end user

Designed to hide the complexities of encryption technology from the end user.

 

Bullet Command Line Options

Secure IT allows to encrypt and decrypt files from the Command Line. You can group a series of encryption and decryption commands in a single or multiple batch files and run it to get the desired results.

 

Click here to download a fully functional 30 day trial version of Secure IT