Introduction

With Steganos II Security Suite you have chosen a security system that goes far beyond everything you may have used on your PC. Steganos II Security Suite is a total security solution.

Today the technology of cryptography is wide-spread - it is the most important way to protect private data. But often encrypted data draws unwanted attention. Unreadable information is a magnet to hackers. Passwords are compromised; the solution to this problem can't be strong encryption alone.

This is where steganography comes into action. Steganography conceals the fact that there is sensible information. To accomplish this, data is first encrypted and then encoded into the background noise of other files. These files containing hidden data are called carrier files. These carrier files can be sound or graphic files.

Steganos II Security Suite combines the powerful techniques of cryptography (encrypt) and steganography (hide) in order to reach a maximum of security. This combination has already proven its worth: The first version of Steganos is wide-spread and is continuously awarded by the international press. For a good reason: the export restricted algorithms used in Steganos are the best ones available. Hackers and security experts who attempted to break Steganos' encryption failed although tremendous efforts have been made.

DEMCOM is proud to be a pioneer in the field of steganography. Due to many years of experience and exchange with our international partners and customers we are able to present Steganos II Security Suite which is decisively ahead. At the same time it can be used to decrypt data that has been encrypted by previous Steganos versions. Upgrades for users of older versions are available, too.

Whether on your PC at home, on the laptop, or in the office: The result of our efforts is a security package which integrates easily into your existing Windows system. That's why it naturally assists you in your daily work.

One of the new functions is the Steganos Safe. It behaves like a normal drive. You can save files from your word processor and even the internet directly into the Safe. Using the Safe is as easy as this: You press a hotkey (or click on the Safe symbol in the taskbar) and the whole drive disappears. After entering the right password your files are available again - exactly where you left them. You don't even recognize that strong encryption is working for you in the background.

Some other highlights are public key steganography and a brand new software defense against compromising rays, which are emitted by monitors and graphic cards. This is not a new threat at all, but it could only be combated with expensive hardware - until now.

In the name of our team and our partners I would like to thank you for placing trust in us and invite you to visit our web site at http://www.steganography.com.

sign_fh.gif (2236 Byte)
Fabian Hansmann
fabian@demcom.com
Product manager Steganos

P.S.: DEMCOM is serious about your requests. If you have questions, suggestions, or problems our customer service is always there for you.

Read on...

Features
Algorithms used
Steganos in the real world
First steps
Development team
Steganos reviews (online)