The component tetraguard.device & more protects against unauthorized reading and copying of data (internal and external) from and to different removable data carriers, such as CD/DVDs, USB sticks or MP3 players. When tetraguard.device & more is used, interfaces such as IDE, USB or Firewire remain open so that keyboard, mouse, printer, scanners, etc. function without any difficulty. However, outbound data flows are encrypted.
Authorization keys can be used to individually clear this function on the workplaces for a specific period of time to enable data transfer from and into the company network.
If a data carrier is transferred within the company from one employee to another, the encrypted data are automatically recognized and decrypted. The data are only readable outside the company when they are written with specially deployed authorization keys (inserted USB token).
tetraguard technology has the following advantage: it does not lock any computer interfaces (for instance IDE, USB, Firewire), but instead analyses the data flow, encrypts while copying and decrypts during reading automatically. It doesn't need to access any whitelists which would usually involve complicated administration. This enables keyboard, mouse, printer, scanners, etc. to function without any problems because the system differentiates between their data flow and that of the tetraguard USB stick.
automatically encrypts your data on hard disks in one or several partitions or directories, which you determine yourself. This is particularly useful if you want to keep prying eyes away from workplace computers and notebooks. These are protected from a man-in-the-middle attack when data is being transferred to the server.
The deterministically-controlled generation of prime numbers ensures that the authorized owner is able to restore data in every situation. This even applies in the unlikely case that all access keys have been lost. It also guarantees that the keys are stored in a way that makes them inaccessible to hackers.
tetraguard.disk enables several persons to use the same appliance without compromising data confidentiality. Confidentiality is even maintained if the device has to be serviced or data has to be reconstructed following hardware damage.
Encryption renders any effort and expense for securely deleting hard disks unnecessary, since the data remains permanently protected by the encryption. The encryption process already begins while the file is being written.
This means that it effectively prevents the file from being hacked through a sector analysis. Data are only decrypted for processing in the main memory of the device, hence also protecting them against any threat when they are being saved. If the encryption process is interrupted by power failure or hardware damage, the encryption method ensures that the data are not lost but remain readable after the interruption.
The software was developed in compliance with German law and therefore requires no backdoors. tetraguard systems has voluntarily and publically undertaken an obligation to manufacture the products without any backdoors. An alternative version can be provided for use abroad.
It is possible to make sensitive data only accessible to an authorized person or group of persons. This
fulfills a frequent demand of IT employees that data are also not readable for them and that consequently absolute security is provided to keep out any prying eyes of unauthorized persons.
Apart from its simple operation, tetraguard.disk has many product advantages.
tetraguard.net & cloud automatically encrypts your data when moving to a network or to the cloud.
This is particularly useful for data that is located at a central location or even in the data center, which should or should be protected from external glances.
Thus, a data theft is caused by external computers in the network (e.g., a notebook in the corporate WLAN), or even the loss On the road. Even by the intersection of network traffic with sniffer programs, file contents can not be read. through the already known and strong encryption on client side are the data before a man-in-the-middle attack Protected and the file server is relieved. It is possible to obtain sensitive data from only one authorized person, or a group of people. A frequently occurring requirement of EDP employees has been taken into account that data are also not readable for them and thus the absolute security against unauthorized persons Glances.
tetraguard.net & In addition to simple operation, cloud also has significant product advantages.