Steganos in the real world
Steganos II Security Suite solves the security problems of the real world.
The hacker and your credit card
Hacker gain access to your data via internet. Encrypted files are magnets to them. For these often juvenile freaks it's just a game - and the jackpot is your credit card number. But if you hide data using Steganos a possible intruder will not even find encrypted information. Data theft fails in the initial stage. Hiding data in existing files - the technique of steganography - has made Steganos 1.x world famous.
Lost your laptop?
You leave the train. At the station you recognize that your laptop is away. The tormenting question is now whether you simply left it behind after an exhausting business day or if it was a professional theft. The Steganos user does not care. Where ever your computer is - his data is protected by proven export restricted encryption algorithms.
The spy in your company
Consider the possibility that some of your employees prepare to start their own business. Make sure that you do not lose your customers because of them using your resources. No matter what size or sector of industry no company can easily cope with this scenario.
Data theft in the lawyer's office
Often you go without encryption because of laziness. It is often difficult to integrate existing solutions into a well-proven work process. Imagine a burglary in the lawyer's office. All the hard drives are stolen. Embarrassing isn't it? But data security can be archived so easily. All sensitive data is stored in the Steganos Safe and encryption is just a double click away. This is one reason why Steganos is used by an increasing number of lawyers world wide (see the New Yorker Law Technology News journal).
Email security in the editorial office
Informers trust in the journalist's capability to keep their secrets. A loss of confidence can be mortal to both sides. Secrets must stay secret. Especially when it comes to political issues secret services eavesdrop on your email conversation. Sometimes without being controlled by government. Emails are searched for keywords and if potentially sensitive data is found you can be sure that a third person reads your email.
Compromising rays
Intercepting compromising rays is an everyday technology used by secret services. All electronic devices emit compromising rays. These rays can be even used to recover a picture displayed on a monitor. Even if these rays passed walls and the receiver is many meters away. Steganos II makes this kind of eavesdropping more difficult by giving to you the ray defusing display.
ESL400 scanner: Hardware like this makes
it possible to eavesdrop the contents of your monitor (e.g. from a van in front of your
office or from the neighboring flat)
Removable media
They are very useful but without accurate precautions they are ticking time bombs. Think of diskettes being sent by ordinary mail, removable media drives being left unwatched, or a Zip drive* employed at a more or less public place. A hard drive is hard to remove but removable media fall a prey to thieves all too easily.
The government versus your privacy
Last but not least Steganos is the proof that encryption regulations are absurd and useless. Prohibition of encryption is not practicable even though it exists in many countries of the world.
* "Zip" is a registered trademark of the Iomega Corporation.
Related topics
Algorithms
uses in Steganos
The Steganos Safe
SoftTempest: Compromising rays