Encryptor ®

Fast, Simple, Reliable, Transparent Data Encryption.

Real-time operation without any application changes

Latest cryptographic standards - TDES and AES

Secure 128-bit per-file keys

Local & Remote Encrypted Tape Facility (ETF)

Centralized, simple configuration

Power Point Presentation
Encrypted Tape Save/Restore
Key Management

  • Incorporates standard encryption algorithms (AES, 3DES)

  • Encrypts selected data - by file / directory

  • Offers simplicity and ease of use:
    • No additional hardware or software
    • No application changes
    • Single point of configuration
    • Practically no learning curve
    • Dynamic wild-cards

  • Includes local and remote encrypted tape operations (save/restore)
Over 70 per cent of the market capitalization of Fortune 500 companies is attributed to their information assets. Your most important assets are under attack constantly. Yet, it is these very same assets that are most vulnerable today. Why? Because companies today have no choice but to connect their internal networks to the rest of the world to link up with customers, suppliers, partners, and their employees with one another.

There's almost no machine in the world that is not connected. With this connectivity comes total vulnerability. Malicious hackers, criminals, industrial spies; these attackers regularly steal corporate assets and intellectual property, cause service breaks and system failures, mar corporate brands, and destroy businesses. And this can happen to the data on your computer when you least expect it, when you're checking your email, and even when you're offline.

Encryption can often be a confusing subject. You know you need it, but you really don't have the time to learn how it works. The good news is that you don't need to know anything about encryption to use Encryptor.

Encryption is the translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text. Encrypted data is referred to as cipher text. Encryptor uses a symmetric encryption where the same key is used to encrypt and decrypt the message.

The Challenge

Protecting sensitive corporate database in today’s competitive environment and the need to provide network, system and application data-level security is essential. Financial information should be kept in encrypted databases and may be accessed only by authorized programs who have access to a special key. This prevents anyone from being reading the data without knowing the "lock". Encryptor ensures that sensitive customer and partner information remains private and their critical business transactions remain trusted and secure.

Encryptor is a encryption-decryption software layer that is seamlessly integrated with existing Stratus/VOS application to provide data encryption services to existing databases. All this without having to make any changes to the business applications. No source code changes.

Encryptor offers seamless, scalable integration with existing programs. Encryption activities are governed by modifying one simple configuration table. Encryptor's configuration layer also controls the encryption keys and allows specific per-file keys.

Encryptor will seamlessly maintain encrypted hard drives, directories and files to store all of your confidential data.

Encryptor provide ease of integration into existing critical business applications, ease of deployment and high performance built on the reliable cryptographic technology and industry standards.

How does Encryptor work?

During run-time, Encryptor intercepts all I/O operations performed on files marked by the system administrator as "critical". Data buffers are always encrypted before they are written to disk and decrypted after each read operation so that the application will seamlessly receive decrypted data.

About AES Encryption

In June of 2003, the U.S. Government approved the Advanced Encryption Standard (AES) as its standard algorithm for transmitting classified data.

AES was selected by the National Institute of Standards and Technology (NIST) from submissions by the world's leading cryptographers after a 3-year competition.

AES had the best combination of security, performance, efficiency, implementability and flexibility. NIST declared AES secure enough to protect classified information up to TOP SECRET level, that would cause "exceptionally grave damage" to national security if disclosed to the public.

"This standard will serve as a critical computer security tool supporting the rapid growth of electronic commerce," U.S. Secretary of Commerce Norman Y. Mineta said. "This is a very significant step toward creating a more secure digital economy. It will allow e-commerce and e-government to flourish safely, creating new opportunities for all Americans."

It would take a supercomputer 149 trillion years to decode a 128-bit AES key. AES is also the commercial standard for encrypting sensitive digital information, including financial (ATM machines) and telecommunications data.

AES replaces the commonly used Data Encryption Standard (DES).

How Secure is 128-Bit AES Encryption?

For each 128-bit key, there can be 3.4 x 10^38 possible combinations. By comparison, the Enigma code used by the Germans in World War II had approximately 1.1 x 10^7 keys and DES has about 7.2 x 10^16 keys. To put this into perspective, if we assumed a super-computer could break the DES code in one second, it would take the same supercomputer 149 trillion years to decode a 128-bit AES key - longer than our universe has existed. It is to say there no supercomputer in the foreseeable future can brute-force AES 128 bit. As long as no one finds your encryption phrase print-out, your encrypted data can never be deciphered.