🔍 Crx搜搜
FPM II spe
0.0
0
¥299.00
1.1.0.0

截图预览

概述
翻译

Guaranteed protection of digital data is a primary duty of every business and corporation. DEFINITION File Package Manager (FPM II) is a specialized application for encrypting files and folders located on local, network, or external servers, as well as on external data media. The application allows the following actions: • Encrypt or decrypt selected files and folders; • Exchange of encrypted files and messages; • Protected file packages; • Electronic crypto notebooks; • Encrypting the files in the package; • Decrypting the files in the package; • File integrity check; • File modification control; • Checking the current status of files and directories; • Shredding and/or sanitizing the files saved in the package, etc. The encryption of the files for which meta-information is available in the packages and which are physically accessible is performed based on session crypto mechanisms. Each crypto mechanism uses a set of proven cryptographic primitives. Configuration of crypto primitives is done automatically. All operations on the files and folders saved in the package are performed only when the files and folders are physically accessible. If they cannot be accessed (deleted, physically inaccessible network drive, or other reason), this will be reflected in the packet, recording the time when this finding was made. FIELD OF APPLICATION Protecting large arrays of files stored on various media is a complex and challenging process to implement. The use of file packages allows the automation of this process, increases service efficiency, and significantly improves the security of corporate solutions. Storing, editing, transferring, and destroying files is a process that is often overlooked in its importance by both users and those responsible for security. Statistics prove that most threats to information security originate from internal sources. With the help of FPM, it is possible to neutralize all these problems through a highly effective professional cryptosystem using secure file packages. The standardized digital data encryption algorithms used in FPM are identical to those used by specialized government agencies. Unlike similar solutions, FPM allows control and documentation of file package processes in real-time. This makes the application an indispensable tool when building cybersecurity systems that meet the requirements of ISO/IEC 27001 and ISO/IEC 27002. The application's hybrid functions use proven algorithms described in NIST SP 800-88 and NIST SP 800-90A, which include Hash DRBG (Hash Function Based), HMAC DRBG (HMAC Based), and CTR DRBG ( based on block ciphers in counter mode), as well as some specific solutions used in BS 1443 technology. TECHNOLOGICAL SOLUTIONS The choice of proven symmetric cryptographic algorithms guarantees the high efficiency and reliability of the application. FPM uses a set of standard algorithms to build specialized mechanisms for encrypting digital data. FPM uses a set of standard algorithms to build specialized mechanisms for preventing both external and internal threats. The following standard algorithms are used in the base version: STANDARD ENCRYPTION ALGORITHMS • Advanced Encryption Standard (block size of 128 bits, key lengths: 128, 192, and 256 bits); • Blowfish; • CAST-128 (CAST-5); • CAST-256 (CAST-6); • Information Concealment Engine (ICE); • Information Concealment Engine 2 (ICE-2); • ICE Encrypt; • MISTY-1 (Mitsubishi Improved Security Technology); • Ron's Code 2 or Rivest's Cipher 2 (RC-2); • Ron's Code 4 or Rivest's Cipher 4 (RC-4); • Ron's Code 5 or Rivest's Cipher 5 (RC-5); • Ron's Code 6 or Rivest's Cipher 6 (RC-6); • Serpent; • Tiny Encryption Algorithm (TEA); • Twofish. AFFORDABLE HASH FUNCTIONS • Secure Hash Algorithm 1 [SHA-1]; • RIPEMD-160; • Haval [256 Bit, 5 passes]; • Message Digest 5 [MD-5]; • Message Digest 4 [MD-4]; • Tiger; • RIPEMD-128; • SHA-256 (SHA-2 family); • SHA-384 (SHA-2 family); • SHA-512 (SHA-2 family).

特性

Passwords associated with hardware objects. MFG/KDF auto-generated passwords. Hybrid delta-generated passwords. Hybrid delta-generated passwords (implicitly presented passwords, IPP). Encrypt files and folders using a combination of cryptographic primitives. Protected files and message exchange using symmetric encryption. Encrypt and decrypt file packages. Archive files and folders for which information is contained in the packages. Encrypt files and folders located on various data storage devices (data servers, network or mobile devices, etc.). Encrypt data stored in virtual storage. Creating а strong hardware binding of the encrypted information. Мeta information encryption. Hybrid files and folders shredding functions. Protected digital file package notebooks. Professional crypto process reports. Planning, development, and implementation of metascenarios, etc.

此版本中的新增功能

• Use of hybrid modified passwords (HMP); • Creation of hardware dependency for encrypted data (HDD); • Use of meta-scenarios for information protection; • Specialized solution for the exchange of encrypted files and messages; • Hybrid solutions for package protection of large file arrays; • Alternative post-quantum solutions for information protection; • Hybrid solutions for the destruction of digital data; • Protection from internal threats, including from persons with super administrator privileges; • Complex protection of external devices; • Creation of protected virtual data repositories; • Batch archiving of digital data located on different physical media, etc.

系统要求

适用平台电脑

操作系统Windows 10 版本 17763.0 或更高版本

键盘集成键盘

鼠标集成鼠标

内存4 GB

视频内存未指定

处理器x86

图形处理器1920x1200

注意4 GB RAM Memory ;24 Bit High Color;200 MB Hard Disk Space

来自商店的评价 (0)

尚无人评价此扩展,查看 其他语言

留言