products solutions support purchase company

   

 

AirZip FileSECURE employs a range of security features to prevent unauthorized use of electronic files and documents. Each secured file will be protected by many or all of the following:

  • Strong Encryption. FileSECURE secures all files using AES256 encryption – strong enough to be authorized for securing Top Secret documents by the U.S. Government.
  • Unique encryption keys. Every file is secured using a unique encryption key limiting the damage should a key become compromised.
  • Detects and blocks screen capture programs. FileSECURE blocks literally thousands of screen capture and remote access applications to stop confidential information being compromised.
  • Prevents unauthorized printing. A user must be granted specific print permission for a secured file before being able to print it.
  • On-screen and print watermarking/digital fingerprinting. Overlays information regarding the user (e.g. host name, IP address, mac address, Windows user name, FileSECURE User ID, date, etc.) accessing the document when displayed or printed. Primarily used for forensic analysis if someone has used a camera to take a picture of on-screen content or made unauthorized copies of printer output.
  • Lock user access to physical workstations. Users can be prevented from accessing secured content from anywhere other than specifically approved workstations (up to 8 different workstations per user can be registered).
  • Encrypt temporary and recovery files. FileSECURE secures the most common method used to hack into our competitor’s products, many of which use file locking to protect these.
  • User authentication. User’s must authenticate themselves each time they access a secured file. FileSECURE has its own user database, but can also be integrated with LDAP and Active Directory directory services or two factor authentication solutions such as RSA SecureID and Entrust PKI.
  • Audit trails. From the moment a file is secured, all activity concerning that file is logged in FileSECURE’s audit trail database. Comprehensive reporting is available for analyzing events and relationships between events, documents, permissions and users.
  • Secure communications. All communications between FileSECURE Clients and the Authentication & Policy server are conducted over Secure Socket Layer (SSL) channels using the same technology and security as is used when you conduct online banking.
  • Distributed securing. FileSECURE performs all securing activities (encryption and compression) on the securing user’s workstation rather than sending files to be secured to a central location. (FileSECURE A-Author, S-Author, Publisher and WebSECURE components do run on their own servers which should be dedicated and physically secured).
  • Dynamic rights. A user’s rights to a secured file can be changed or revoked at any time. If the user’s employment is terminated access to all their secured files can be revoked immediately. If the user’s computer is stolen, access to secured files from that specific computer can be immediately revoked.
  • Content owner control over security. The owners of sensitive information can control policies and access rights themselves. All other, including IT staff, are not able to access secured information unless explicitly granted permission.
  • Offline control and tamper detection. The only time FileSECURE user’s are able to “lease” rights is when they enter offline mode, primarily used when traveling without internet access. An encrypted cache is populated with keys and rights for selected files. The maximum time that a user can cache keys and rights is determined by policy. Once that time expires, the user must connect to the Authentication & Policy Server and refresh the cache (at which time the audit trail is also transferred from the encrypted cache to the server). Numerous tamper detection methods are deployed to detect attempts at compromising the cache. For example, if any attempt to set back the system clock us detected, the keys in the cache are destroyed.
  • Cryptographic separation in OnDemand environments. FileSECURE was uniquely designed from the ground up to operate in an OnDemand or hosted environment where multiple different organizations are running under the same copy of FileSECURE. Each organization is cryptographically separated from each other, so that even if a user from one organization were able to obtain access to a secured file belonging to another organization hosted on the same server, they would be unable to do anything with it. In addition, no files – secure or unsecured - are ever sent to or stored on the Authentication & Policy Server thereby preventing the operators of the OnDemand service from even attempting to access content.
  • Printer whitelisting for location based printing (available on special request). Further restricts authorized printing to specific physical printers.