File Encryption Software Product List and Ranking from 4 Manufacturers, Suppliers and Companies | IPROS

File Encryption Software Product List

1~6 item / All 6 items

Displayed results

【Security Measures】Easy-to-use and inexpensive file encryption software

A trump card for encryption that supports work styles in the new normal era! Encryption software with a master key.

"CyberCrypt Ver.5.1" is file encryption software with a master key that prevents encryption forgetfulness and ensures thorough security measures. The number of scenarios handling important information outside the company or in the cloud is increasing. It is essential to encrypt and protect important files. Encrypting important files without the user's awareness. Achieve cost reduction and efficiency with simple operations. 【Features】 ■ Avoid information leakage risks without burdening users ■ "Master Key" for peace of mind even if the encryption password is forgotten ■ Reduce operational costs without the need for a password management server ■ Ensure safety and security in the new normal work style through encryption - For telework, remote work, or on cloud storage *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • File Encryption Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『C4U Enterprise』

Leave the file security of in-house servers and PCs to this one solution!

"C4U Enterprise" allows you to manage encrypted files on the server using a group key. It solves issues such as "I want to keep my files private, but I want everyone to be able to use the files on the server" and "I'm worried about personal management of USBs." 【Features】 ■ Windows login with USB key ■ Distinction between user key and group key (manual encryption/decryption) ■ Folder settings (automatic encryption/decryption) *For more details, please refer to the PDF document or feel free to contact us.

  • others
  • File Encryption Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Prevent information leakage with file encryption software.

Enhance your security level! Introducing ways to prevent information leaks on the blog.

This blog discusses measures against information leakage using file encryption software. File encryption is the process of converting certain data into another form through special processing. To view the encrypted data, it is necessary to decrypt the file using a "key," such as a password. By using file encryption software, even if the data falls into the hands of a third party, its contents cannot be read. [Contents] ■ Loss of customer trust if information leakage occurs ■ Software that automatically performs encryption is gaining attention ■ Choose based on the overall cost-performance ratio of information leakage countermeasures * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems
  • File Encryption Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Presentation of file encryption technology for the manufacturing industry is currently available.

Attention those concerned about the leakage of technical information! How can file encryption prevent information leaks such as CAD and drawings? Measures in China are also included.

At our company, which handles file encryption software and security systems, we are currently offering materials that explain file encryption technology for the manufacturing industry. We discuss security measures in environments that handle design drawings, such as CAD, concerns when using encrypted files in China, and the necessity of controlling printing and screen capturing. 【Contents】 ■ Advantages of file encryption technology ■ Functions and features of products necessary for encryption operations ■ Strengthening security and improving operational efficiency *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security systems
  • Other CAD
  • File Encryption Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CAD/CAM compatible transparent file encryption software available for use in China!

[Presenting Materials!] Detailed explanation of necessary information leakage countermeasures and basic security measures for manufacturing sites!

IP-guardV+ is a next-generation file encryption product that is location and application agnostic. It allows files to be used in an encrypted state without awareness from the moment they are created until they are deleted, in various scenarios such as internal/external, offline/online, thin client/fat client, and domestic/international. Additionally, it supports various Windows applications, including CAD/CAM systems, enabling the protection of not only general document files but also files that are highly important to businesses from leakage. 【Summary of Features】 ○ Measures against information leakage both internally and externally ○ Usable globally (including China) ○ Adopts a unique encryption engine that minimizes operational delays ★ Currently, you can also download the detailed explanation of basic security measures in the document titled 【Information Leakage Countermeasures Necessary for Manufacturing Sites: Manufacturing Industry Edition】. For more details, please download the catalog or contact us.

  • Other Software
  • File Encryption Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『CRYPTO RELAY』

For encryption measures for data exchange between general-purpose machines, UNIX, and WinglayS!

"CRYPTO RELAY" is a file encryption tool equipped with the domestically developed high-speed encryption technology C4S, boasting high security. Due to its simple commands, it can be easily integrated into routine operations. It is effective for addressing issues such as the protection of customer information during business outsourcing like invoicing and direct mail, as well as data protection for various outsourced computing tasks in accounting and finance. 【Features】 ■ Secure and easy file encryption ■ Supports encryption keys up to 65,536 bits ■ Fast encryption and decryption with minimal impact on business operations ■ Easy integration into Shel/JCL/CL through batch processing, allowing for use with minimal changes *For more details, please refer to the PDF materials or feel free to contact us.

  • others
  • File Encryption Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration