Virtual Disk Security

New product

Virtual Disk Security - A program for creating and working with virtual e

More details

Virtual Disk Security - A program for creating and working with virtual encrypted disks with password access. The program guarantees the highest degree of security of your data stored on encrypted virtual disks. Description
System Virtual Disk Security Creates protected virtual disks on the basis of the "file-container" principle. They can be created on a hard, removable or network drive and used like any other logical drives: they can write and delete files of any format, they can be used to work with various applications.
Information on the protected disk is always stored in an encrypted form. By using the technology of "transparent" encryption, data protection does not affect the operation of them: writing and reading from a protected disk are absolutely transparent to the user. To work with information, you only need to enter a password. At the same time for unauthorized users, protected disks and information on them remain inaccessible. Strong encryption algorithms are used to secure data in Virtual Disk Security. Symmetric algorithms RC5, AES and GOST 28147-89 have a key length from 128 to 256 bits and are best suited for data protection in storage places, including local workstations and laptops.
Appointment
The Virtual Disk Security system is designed to protect against leakage of confidential data that is stored and processed on workstations and laptops.
Keeping important information on the personal computers of employees significantly increases the risks of its compromise. In the event of loss, theft or forced removal of a working computer or laptop, access to the data stored on it for an attacker will not be difficult, because the standard password protection is very easy to circumvent.
Virtual Disk Security protects data on personal computers and laptops during use, storage and transport. Particularly relevant is such protection for laptops - theft and loss of a laptop while transporting is one of the most frequent reasons for the leakage of confidential information.
Virtual Disk Security runs on transparent encryption technology. The use of "transparent" encryption makes the use of Virtual Disk Security as simple as possible for end users and does not require any reconfiguration of software that uses protected data. Main tasks to be solved
  • Safe storage of information on personal computers.
  • Safe work with confidential data on the laptop on a trip.
  • Data protection against unauthorized access during transportation, repair and maintenance of computers.
  • The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
  • The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
  • The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
  • The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
  • The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
  • The prohibition of access by unauthorized persons through the local network to data on workstations of employees.

The prohibition of access by unauthorized persons through the local network to data on workstations of employees.

The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees. The prohibition of access by unauthorized persons through the local network to data on workstations of employees.
The prohibition of access by unauthorized persons through the local network to data on workstations of employees.