contents

software
 
WinMagic Releases SecureDoc v4.3 Full-Disk Encryption Solution

WinMagic announces the release of SecureDoc v.4.3. This version incorporates an improved user-friendly Graphical User Interface to make it simple for administrators to manage all communications between SecureDoc clients and the SecureDoc Enterprise Server in real-time. Increased functionality includes a new log system to provide administrators with enhanced system feedback, and a quarantine system to expedite the trouble shooting of communication problems.

SecureDoc v4.3's flexible functionality enables the system to determine whether communication with the server should be postponed to lower potential network traffic. Designed to fit any organization's security policy, SecureDoc v4.3 also provides administrators and users with the ability to encrypt different partitions with respective encryption keys during the initial full-disk encryption process – making it simple to encrypt specific areas of the hard drive.

SecureDoc v4.3 provides improved Removable Media Encryption functionality, which can be easily enabled from a Windows Explorer browser. Regardless of whether an endpoint device is running SecureDoc full-disk encryption software or not, USB thumb drives can now be easily read with WinMagic's DiskViewer. This functionality makes it easy for SecureDoc users to not only encrypt removable media, but also transport the USB thumb drive for use on other computers without the purchase of additional licenses – provided the user authenticates to the USB device.

Compatible with Microsoft Windows 2000, XP, 2003, and all editions of Vista, SecureDoc v4.3 enables organizations to protect existing investment in encryption technology by making it simple to continue utilizing SecureDoc when upgrading the operating system. Looking forward at ever-pervasive computer design and components, SecureDoc v4.3 expands its support for the Trusted Platform Module to include support for TPM v1.2. Building on the popularity of the TPM chip, SecureDoc assists in adding an extra layer of security by seamlessly supporting the authentication of the disk drive to the computer.

The vast array of tokens supported by SecureDoc v4.3 include the Department of Defense's Common Access Card, Oberthur CosmopollC Card, ActivIdentity V3 Support, 02Micro USB Reader that comes built in with Dell Latitude 620 and 820, Omnikey ExpressCard 4321 reader, Thales TVPN-08, added support for the onscreen keyboard of the Motion Computing LE1600, IBM JCOP41 card with Fingerprint recognition, Fujitsu STYLISTIC 5000 Series, and NTT reader.

Administrator, user, and system friendly, SecureDoc v4.3 installs transparently and silently in the background to encrypt the entire hard drive, and does not require its own partition, saving administrator time and as much as 1.5 GB of hard drive space. SecureDoc v4.3's versatile capabilities also include:
- Full support for Spyrus Elliptic Curve Cryptography (ECC): Predicted to be the predominant public key cryptography mechanism as it provides the same security as traditional public key schemes with much shorter key sizes. The U.S. National Security Agency has endorsed ECC technology by including it in its Suite B set of recommended algorithms;
- Full support of certificates from local store which enables a user to choose to use their Windows Certificate to protect their SecureDoc key file to add another layer of protection for the 256-bit encrypted key;
- Additional support of third party software, including Norton Ghost 10, IBM ThinkVantage Rescue and Recovery version 3, and Kaspersky antivirus;
- New support for Microsoft SQL 2005 as the database backend;
- Full support for Absolute's Computrace software.

SecureDoc v4.3 makes it simple to deploy and manage encryption for any number of users. Remote features permit adding, removing, or augmenting users and profiles as well as allowing password recovery. Integration with Active Directory and other LDAP servers such as PKI, and Novell add extra value for SecureDoc customers.



write your comments about the article :: © 2007 Computing News :: home page