Comodo Locks Down Sensitive Information on Laptops, Desktops

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

Jersey City, N.J. — March 10
Six-pound laptop computers can each carry as much information as several 5-foot filing cabinets. How perfect they are for transporting information, across town or across the ocean.

Thieves see them the same way. A stolen laptop computer or mobile device can yield a rich trove of data. With stolen information, thieves can fraudulently use information to steal money, or worse, damage brands and corporate goodwill.

Comodo Security Solutions Inc.’s Disk Encryption offers easy-to-use protection for businesses who want to protect their information from falling into the wrong hands. Using security algorithms, Comodo Disk Encryption encrypts any drive partition or even virtual partitions, without disrupting computer usage or performance.

Password authentication allows computer users to set passwords as access authentication keys to encrypt the required drives.

For added security, users and administrators can choose to require a USB memory stick to access the encrypted drives. The USB stick acts as a key to unlock the protected information.

Combining password and USB authentication produces the most secure disk encryption Comodo offers. Using both at the same time qualifies as two-factor authentication required by many regulations such as the PCI DSS and FFIEC.

Comodo Disk Encryption can be used on mobile and desktop computers alike. With Comodo Disk Encryption, users have powerful control over their machines, including specifying who may start a specific computer, or keeping one partition of a shared computer “off limits.” USB key users who want to make their information unrecoverable — anywhere — need only destroy their USB keys.

Comodo Disk Encryption continually protects sensitive data, giving the computer user both powerful control and unprecedented freedom to carry it where it is needed without fear of compromise. For more information visit Comodo Disk Encryption.

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone


Posted in Archive|


Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>