Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Disk encryption for locking down sensitive laptop information

Comodo Group : 12 March, 2009  (New Product)
Comodo's full disk encryption system ideal for securing the increasingly large amounts of sensitive data carried around on portable laptop computers
Six-pound laptop computers can each carry as much information as several five-foot filing cabinets. How perfect they are for transporting information, across town or across the ocean.

Thieves see them the same way. A stolen laptop computer or mobile device can yield a rich trove of data. With stolen information, thieves can fraudulently use information to steal money, or worse, damage brands and corporate goodwill.

Comodo Security Solutions's Disk Encryption offers easy-to-use protection for businesses who want to protect their information from falling into the wrong hands. Using security algorithms, Comodo Disk Encryption encrypts any drive partition or even virtual partitions, without disrupting computer usage or performance.

Password authentication allows computer users to set passwords as access authentication keys to encrypt the required drives.

For added security, users and administrators can choose to require a USB memory stick in order to access the encrypted drives. The USB stick acts as a key to unlock the protected information.

Combining password and USB authentication produces the most secure disk encryption Comodo offers. Using both at the same time qualifies as 'two-factor authentication' required by many regulations such as the PCI DSS and FFIEC.

Comodo Disk Encryption can be used on mobile and desktop computers alike. With Comodo Disk Encryption, users have powerful control over their machines, including specifying who may start a specific computer, or keeping one partition of a shared computer 'off limits.' USB key users who want to make their information unrecoverable—anywhere—need only destroy their USB keys.

Comodo Disk Encryption continually protects sensitive data, giving the computer user both powerful control and unprecedented freedom to carry it where it is needed without fear of compromise. For more information visit Comodo Disk Encryption.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo