Latest cryptographic standards - TDES and AES
Secure 128-bit per-file keys
Local & Remote Encrypted Tape Facility (ETF)
Centralized, simple configuration
Power Point Presentation
Encrypted Tape Save/Restore
There's almost no machine in the world that is not connected. With this connectivity comes total vulnerability. Malicious hackers, criminals, industrial spies; these attackers regularly steal corporate assets and intellectual property, cause service breaks and system failures, mar corporate brands, and destroy businesses. And this can happen to the data on your computer when you least expect it, when you're checking your email, and even when you're offline.
Encryption can often be a confusing subject. You know you need it, but you really don't have the time to learn how it works. The good news is that you don't need to know anything about encryption to use Encryptor.
Encryption is the translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text. Encrypted data is referred to as cipher text. Encryptor uses a symmetric encryption where the same key is used to encrypt and decrypt the message.
Encryptor is a encryption-decryption software layer that is seamlessly integrated with existing Stratus/VOS application to provide data encryption services to existing databases. All this without having to make any changes to the business applications. No source code changes.
Encryptor offers seamless, scalable integration with existing programs. Encryption activities are governed by modifying one simple configuration table. Encryptor's configuration layer also controls the encryption keys and allows specific per-file keys.
Encryptor will seamlessly maintain encrypted hard drives, directories and files to store all of your confidential data.
Encryptor provide ease of integration into existing critical business applications, ease of deployment and high performance built on the reliable cryptographic technology and industry standards.
AES was selected by the National Institute of Standards and Technology (NIST) from submissions by the world's leading cryptographers after a 3-year competition.
AES had the best combination of security, performance, efficiency, implementability and flexibility. NIST declared AES secure enough to protect classified information up to TOP SECRET level, that would cause "exceptionally grave damage" to national security if disclosed to the public.
"This standard will serve as a critical computer security tool supporting the rapid growth of electronic commerce," U.S. Secretary of Commerce Norman Y. Mineta said. "This is a very significant step toward creating a more secure digital economy. It will allow e-commerce and e-government to flourish safely, creating new opportunities for all Americans."
It would take a supercomputer 149 trillion years to decode a 128-bit AES key. AES is also the commercial standard for encrypting sensitive digital information, including financial (ATM machines) and telecommunications data.
AES replaces the commonly used Data Encryption Standard (DES).