1 / 22

DATA Security

DATA Security. Data on your computer , contains documents and information about your career or private life . control access to these datas digital envirinment.

braden
Télécharger la présentation

DATA Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DATA Security • Data on your computer, contains documents and information about yourcareer orprivate life. control access to these datas digital envirinment. • Computer hardisk or flash disk and external disks are most popular data storge devices. These devices are portability and high memory capacity.

  2. DATA Security Theft, copying and lost may result in private information being viewed by other people.

  3. DATA Security Cloud technology will be more important soon with developing technology. As cloud computing grows in popularity, thousands of companies are simply rebranding their non-cloud products and services as “cloud computing.”

  4. DATA Security Cloud technology will prevent the loss of data. However, the end-usernot to trust cloud technologybecause of the personal data security

  5. DATA Security • Cisco: cloud traffic will increase 6 times stated in the next 2 years.http://www.btnet.com.tr/60388-ciscoya-gore-5-yil-icerisinde-bulut-trafigi-6-kat-artacak.html • Symantec: “Securecloudtechnology” http://www.btnet.com.tr/61054-symantec-gelecegin-bulut-guvenligi-haritasini-cizdi.html

  6. DATA Security • Data theft is one of the most important issues of today. • http://teknobak.com/bulut-hizmeti-yeni-yasa-ile-kara-bulut-hizmeti-oldukullanicilar-tehlikede_6_54465?utm_source=dlvr.it&utm_medium=twitter#.UZnXwKLxpI0 • In recent days, United States prism summarizes everything.

  7. “You can not measure what you do not know, if you can not measure, you can not control.” • What our values ​​are under control in the digital world? In other words • Can we make sure that only the relevant data under our control ourselves? Ask yourself this questions.

  8. DATA Security You can encrypt datas with securKEY. Preventto theft of information in this way.

  9. securKEY protected files can be of any size and any type of file. • Encrypted data can be portable in the cloud, local disk, memory disk, flash disk and network share.

  10. What is securKEY? • securKEY is a USB hardware devices. Images, videosand documents are provides security by encrypting

  11. What is NOT securKEY? • securKEY is not a Flash Disk • information can not be transferred intosecurKEY Supports all file types stored on your PC. The same key is not used in any way. Use the unique product key.

  12. Two Factor Security • Two-factor authentication system, "something you know" and "something you have" and recognizes you. Next to the password you want to have a security key. Two-factor authentication systems with the user information in a way that you have stolen something will not work without. • securKEY offers a two-factor security system.

  13. The algorithm can read someone else? • SecurKEY stored and used only in key algorithm. For this reason, your computer or disk encryption (the media) would not be no trace on the algorithm.

  14. securKEY is not workwith certificate-based, algorithm-based algorithm works produced. All algorithms are unique. • This unique algorithm, each document is protected through encrypted with different keys. • Even if the document is protected by the same key is never used.

  15. Difference is other USB products; • Other products, the data contain encrypted fields. • We encrypt the data and relate the device of USB.

  16. securKEY hardware, software and engineering with 100% local production. Only use are imported crypto processor. Our product is patented and all trademark rights belong to our company.

  17. securKEY'in Technical Specifications • Microprocessor-Based Architecture • securKEYworks microprocessor-based. securKEYprocessors in the world uses one of the most preferred projects for military purposes. A system which can not be used to copy. • Embedded Encryption Algorithm • securKEY256-bit AES encryption engine.

  18. Line Security Algorithm (the world's first and only) Unlikely to repeat the incoming and outgoing data through the line ~ 8.135 * 10 ^ 2311 'is 1 in. So it is impossible to obtain significant data lines even listened. • Driverless USB Support securKEY are automatically recognized by the operating system, users do not need to install any driver.

  19. Detection of unauthorized communication to lock yourself securKEY; When it detects an unauthorized attempt to communications device or function implements the two-stage locking. Operational trials process itself and the partial locks this lock can be opened only by our company, administrative process, the device completely locks itself. PRODUCT FEATURES • Microprocessor-Based Protection • Embedded 256-bit AES Encryption Engine • Rados repetition Data Flow System • UniqeAlgorithm • USB Interface • NonRequiring the installation drive. • To lock itself when it detects unauthorized communication • CompatiblewithWindows 98 SE, 2000, 2003, 2008 Server, XP, Vista, Windows 7, Windows 8 • 2 Year Warranty

  20. Physical Properties More Information: www.securKEY.com.tr

  21. Thank You!

More Related