by Cypherix
Platform: Windows
Buy new:
(Visit the Best Sellers in Networking list for authoritative information on this product's current rank.)
Compression and Encryption - Offers 448 bit encryption and very high compression.
Open source secure algorithm - Secure IT uses Blowfish, one of the strongest cryptographic algorithms in existence. Also supports AES encryption algorithm, the new official US government standard.
Built in file shredder - When files are deleted with standard methods, they are not completely removed from the hard disk.These files can then be 'undeleted' or recovered - a serious security breach. Secure IT's integrated file shredder module removes all traces of data.
Secure e-mail module - Send zipped, secure email attachments. The recipient need not have Secure IT installed to decrypt the files, all that is required is the password.
Command Line Processing: Powerful command line processing available for encrypting and compressing at the command prompt.
Encryption made easy - Designed to hide the complexities of encryption. Encryption made as easy as ABC.
Total security - Statistically impregnable against brute force attacks. It would take more than the age of the universe for all the computers in the world working simultaneously to decipher a Secure IT encrypted file.
Fast encryption - Secure IT is fast, and requires relatively few computing resources and little time to encrypt files. Encrypt files in seconds.
No " back doors" - No unauthorized access to encrypted data is possible under any circumstances. There is no special procedure, secret code, or hidden entry method to fall back on.
Encrypts all data - Secure IT encrypts files from spreadsheets, graphics, word processing or any other source; on every kind of re-writable media, whether floppy disk, removable hard drive, zip drive, tape drive or other.