Reflex Magnetics - Security Software Experts, UK Data Security Software Since 1985
www.reflex-magnetics.co.uk

home news products services support corporate downloads online sales
search
Reflex Magnetics - Security Software Experts, UK

reflex datavault
Powerful data encryption for your PC

Reflex Magnetics DataVault

current version: 2.61

What Reflex DataVault offers?
 
» Virtual hard disk encryption
» Simple save it encrypt it functionality
» Secures sensitive data whilst on the internet
» Supports multiple user access
» Provides secure data transfer when changing notebook
» Separates sensitive data
» Secure challenge response password recovery
» Comes with third party endorsements/certificates

What can Reflex DataVault do?
 
» Encrypts programs and data
» Can be installed in minutes
» Can be transparently deployed across a network
» Allows service packs and OS upgrades to be performed without deinstallation.

View Page
 
Introduction
Features & Benefits
Features Explained
Detailed Description
Endorsements & White Papers
Certificates




DIPCOG cert.

CESG CAPS
Features & Benefits Explained

goto:

Secures data - even if hardware is stolen
Data within the Reflex DataVault drive is secured at all times. By automatically locking the encrypted drive at shut down. The user does not need to remember to lock the container. The data is also secured in the event of power or system failure.

Silent network deployment and key management
Reflex DataVault can be silently deployed across networked PCs using a pre-configured installation script. It is possible to install multiple copies and perform the necessary encryption key backup automatically across a network. NOTE: Reflex Deployment Server can be supplied with Reflex DataVault or alternatively any existing software deployment application can be used.

AES encryption algorithm as standard
The AES (Advanced Encryption Standard) algorithm Rijndael is both a UK & US government approved, FIPS publication 197. Providing a combination of security, performance, efficiency, ease of implementation and flexibility.

What is the chance someone could "crack" an AES key? Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key.

To put that into perspective, the universe is believed to be less than 20 billion years old.

Separate 128-bit hash key encoded password (SHA1)
The encryption/decryption key is secured by a separate 128-bit one way hash algorithm. If the password is unknown it is not possible to get access to the encryption key which is held in encrypted form on the hard disk.

Administrator configurable password-rules & system lock-out.
Password rules include: password expiry, maximum password length, minimum password length, number of different characters, number of different numerical characters & number of bad login attempts (once this is exceeded the drive account is disabled). This ensures full use is made of the 128-bit key.

Unlimited encrypted drive size
The size of the encrypted drive is only limited to the amount of "free" unused space available on the host hard drive.

Automatically secures MS Windows Swap/Paging file.
By automatically purging the MS Windows Swap file at shut down the chance of sensitive data being left in clear text is eliminated.

Links encrypted drive to user profiles on shared PCs
By linking each encrypted drive to a user profile the system is extremely user friendly on shared PCs. Each user will only be offered access to the defined encrypted drive.
<< Features & Benefits Features & Benefits Explained (cont.) >>

Home | News | Products | Support | Links | Contact Us | Site Map | Employment | Downloads | Press releases | E-Sales
© Reflex Magnetics 2002-2005. All rights reserved