Protect and attach

May 2003
Management Services;May2003, Vol. 47 Issue 5, p34
Academic Journal
Pointsec Mobile Technologies AB will roll out file encryption software that will empower users to encrypt a document and pass on sensitive information securely. The recipient does not need to have the software installed. Instead, the file decrypts itself once the correct password has been entered. The file remains encrypted even if the recipient saves it on the hard disk, a server or some other external media. This always protects the information should there be a breach of computer or network security.


Related Articles

  • POINTSEC EXTENDS DATA ENCRYPTION TO LINUX.  // UNIX Update;Jan2005, Vol. 16 Issue 1, p7 

    This article reports on the expansion made by Pointsec, the worldwide de facto standard for mobile device security, to its endpoint security solutions to encompass Linux, the world's fastest-growing operating system. Pointsec for Linux enables users to protect their most confidential data stored...

  • Butterfingered mobile device users create further IT risk. Wexler, Joanie // Network World;2/21/2005, Vol. 22 Issue 7, p61 

    The article reports that the need for a structured approach to the management and security of mobile devices is escalating. Smartphone-style devices, in addition to supporting voice communications, are increasingly likely to store sensitive corporate data and intranet connections. They are most...

  • AstraZeneca commits £700,000 to beef up workstation encryption.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2004, p18 

    Discusses the plan of pharmaceutical company AstraZeneca to encrypt its workstations worldwide in a bid to improve user authentication. Cost of the project; Kinds of mobile equipment which can be used by authorized users in accessing data according to service provider Pointsec Mobile...

  • Mobile IT security.  // Management Services;Dec2003, Vol. 47 Issue 12, p31 

    Pointsec Mobile Technologies has a new mobile security solution--Pointsec for Symbian OS. The company already has security solutions for Windows-based computers. Pocket PC and Palm OS and the Symbian one completes its protection for all leading mobile platforms. If a Symbian OS device is stolen...

  • Check Point to buy mobile security specialist.  // Network World;11/27/2006, Vol. 23 Issue 46, p5 

    The article reports on the expansion plan of Check Point by acquiring the mobile devices technology of Pointsec Mobile Technologies AB. The company is planning to expand the scope of its security products by adding data encryption on its mobile technologies. Gil Shwed, chairman and CEO,...

  • A Hybrid Approach for Security Enhancement by Modified Crypto-Stegno Scheme. Manikandan, G.; Kamarasan, M.; Rajendiran, P.; Manikandan, R. // European Journal of Scientific Research;9/21/2011, Vol. 60 Issue 2, p224 

    In this Information era, where all the transactions and files are digitized, the need for secure channel is eminent for transactions and confidential files. Information security is vital for many systems like core banking, defence systems, Satellite control systems, etc. wherein breach of secure...

  • The Simple Way to Keep Your Private Files Private. Dunn, Scott; Spanbauer, Scott // PCWorld;May2007, Vol. 25 Issue 5, p115 

    This article explains that there is only one way to one's files really confidential and that is by encrypting them. It says that most Windows versions' Encrypting File System (EFS) in Vista, XP and 2000 scrambles the contents of files and folders, thus making it really difficult for other people...

  • SCS 2.0 beefs up desktop defense. Garcia, Andrew // eWeek;4/26/2004, Vol. 21 Issue 17, p58 

    With Symantic client Security 2.0, Symantec Corp. extends its desktop-based defenses against blended attacks by offering stalwart anti-virus protection, much-improved firewall and intrusion detection capabilities, and even a handy new adblocking engine. With SCS 2.0, IT administrators will find...

  • DON'T LOSE YOUR BEST ASSET. Allen, Martin // Computer Weekly;4/18/2006, p40 

    The article presents views of the author on the role of data encryption in preventing security breaches and protecting a firm's reputation. Companies across the world have always preferred not to reveal details of information technology security breaches. To do so could create problems ranging...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics