Can you keep a Secret? Encryption of data on a disk and server
- Home
- Blog
- Technical Support
- Can you keep a Secret? Encryption of data on a disk and server
Cloud technologies allow securely hide critical data on remote servers and protect it with regular backups. And to enhance secure access to this data, you should take care of the encryption of channels and data. Today we want to tell you about a program Secret Disk that allows you to provide data encryption. We will tell you what the program is, on what basis it works, and, most importantly, what benefits it will bring to your business.
What is it and how it works?
Secret Disk is software for Windows that encrypts any data on a computer, server, or removable disk.
How does it work? It's very simple. You receive the product distribution, detailed installation instructions, and consultations. You also get a token (key) with a USB connector or a smart card that contains a license to the product. To open the protected disk after encryption, you need to use the token (insert it into the USB port) and enter the password (pin code), It means that you need to go through two stages of authentication. Without the token, an attacker does not even find out that the data on the disk is encrypted because the fact of the encryption is also encrypted. And even if the attacker has the token, without the password, and with the current capacity of the servers, the decryption process (in the case of Secret Disk, they can only randomly select the desired combination) will take many years.
Secret Disk in a cloud
Let us start with a fictional but at the same time, a very real example. Imagine that a cunning Villaribo villager took and revealed to agents from Villabajo (for a substantial reward, of course) a secret recipe of a miracle detergent. As a result, the fruits of many years of hard work of Villariba Washing and Cleaning University scientists are now actively used by competitors, and apart from using, they sell it under their brand. It is unfair.
You probably know that important information can be easily "misused" by people who have legal access to it, for example, along with access to their work environment on a corporate server. Secret Disk Server NG is designed for such situations. You can issue tokens to the entire data set only to trusted employees and set for the rest of the employees the access levels that correspond to their job responsibilities. This will help worry less about a weak link in the team.
Cases
Below we will consider several cases of successful use of Secret Disk in real life.
- Storing data on a laptop. A laptop is a great solution for those who need power and mobility at the same time. Yes, a truly brilliant invention of mankind. The only drawback of portable computers that they are often lost or stolen. Of course, it is also a pity to lose a device, but you can survive its loss somehow, but the loss of critical information can sometimes cost the company astronomic sums of money. The solution is to encrypt all the important data using Secret Disk, and even if you lose your laptop permanently, you do not have to worry that your work will be in the wrong hands.
- Giving of a computer for service. The situation is similar to the previous one. Unfortunately, any equipment is not eternal, and from time to time, requires repairs or upgrades. In earlier times, you had to move all the important data to other computers or even take out hard drives. Now it is enough to encrypt the data. Nobody will get to your data or even find out about its existence.
- Encryption of databases (1C, Outlook, etc.). When it comes to differentiating access to information on the server, you should also remember about the databases. Secret Disk encrypts them in real-time. When accessing data from an external application, for example, 1C client, this program only outputs ready-made results, and not the entire database. It means that uninvited guests who want to be curious will just get a clean section. Since the database only communicates with the Secret Disk application and is not stored explicitly, it is also protected from malicious code.
The next plus is in the protection mechanism from insider dealing, too curious system administrators and accountants, who could blackmail a company's Chief Executive with the secrets available to them after a job change.
That's all. All the technical details of Secret Disk you can find on the developer's website. If you want to know about the price, ask us. And, as always, you can contact us concerning secure cloud storage and other cloud-based solutions 24×7.