|
|
Windows-independent Data Security System |
Data Security System features: |
R-Guard's Windows-independent Security System enables its users to set the access
rights either for users or applications to access and/or modify file system objects on
any file system including FAT. For example, the administrator can forbid access to any
or all .doc file objects for all applications except Microsoft Word. After that, even
if any virus application starts in the system, the file would never be corrupted or
deleted by the virus. Also, the administrator can forbid access for a peer-to-peer file
exchange program to all files in the system except files in its own folder(s).
In this case, even if the program starts a trojan, it will never get access to the data
or system files. Such protection level cannot be achieved by the standard Windows
security services because they control access to files basing on the user's access
rights, which the trojan can easily obtain, whereas R-Guard controls the access rights
individually for each program.
|
- Total control over file/folder operations at the user and application level;
- Login monitor traces user activity: user login, logoff, etc from the local computer and network;
- Two types of access control: user-specific and process-specific access rights;
- File isolation. R-Guard administrator can completely isolate any file from any process;
- True file/folder hidden attribute to make the file/folder inaccessible for any Windows program, unlike the Dos and Windows HIDDEN attribute;
- File access blocking (Read\Write\Rename\Delete);
- Ability to block the start of any executable file (EXE DLL COM BAT HTML XML JS CLASS, 32/16 bit applications, Win32, Win16, Dos, DPMI);
- File system-independent extended attributes stored in a distributed database (UNIX-stile data security architecture). This allows the user to set extended attributes on removable network media;
- File wiping to prevent unauthorized data recovery. Upon deleting, a file will be automatically wiped without further chance to recover deleted file. No need to wipe files manually;
- Unauthorized file modification protection (CRC-128). If a file is modified by a user, R-Guard will block access to it until R-Guard administrator finds the reason and source for that modification using the R-Guard audit system.
|
Data Encryption System |
Data Encryption System features: |
R-Guard's easy-to-use, but uncrackable Data Encryption System encrypts file
objects and keeps them encrypted on any hard disk regardless of the file system
including FAT and even on a virtual hard drive on a remote file server. To protect
the data from loss, the user can create a backup of encrypted data / files on external
devices visible by the host operating system such as a Floppy Disk, CD, Flash Card,
USB, etc.
|
- True-On-The-Fly-Encryption (TOTFE) allows the user to enter its password only once at windows logon;
- Guarantee that a decrypted file will never appear in Windows swap files;
- Strong Encryption. R-Guard uses an industry standard AES encryption algorithm with 256-bit key in the Cipher Block Chaining mode;
- Secure encryption key generation. The R-Guard Data Encryption System uses a complex randomized block key and variable-length key generated from the user password (MD5 algorithm);
- Secure files transferring. Files from the remote storage are transferred in the encrypted form and decrypted only on the host.
|
Files Monitoring |
File Monitor features: |
R-Guard users can rapidly trace information about what applications started by any user
accessed a particular file object and what action was taken: read, write, execute,
delete, etc. Then the users can use the R-Guard file monitor to trace the activity
of any suspicious or unknown program and create a rule to block its activity on-the -fly.
|
- Flexible and detailed monitoring of all operations for any file;
- Processes - file operations linking;
- File monitor log filtering and highlighting;
- Powerful file monitor logs search by file masks and regular expressions.
|
Audit System |
Audit System features: |
R-Guard users can easily keep track which file operations or user activity have occurred.
|
- Powerful audit search by file masks and regular expressions;
- Compact binary audit format to save disk space;
- Flexible audit control manager deletes old file logs
|
R-Guard self-protection |
User-friendly interface |
R-Guard protects its modules from malicious access that unauthorized users can do in order to eliminate the traces of their activity:
- Secure connection between R-Guard control panels and kernel;
- R-Guard modules and audit files protection from unauthorized access;
- Protection against R-Guard kernel debugging and unhooking.
- Only R-Guard users can manage and uninstall R-Guard
|
R-Guard provides its users with friendly interface and easy settings:
- Standard outlook-style interface;
- Simple and easy-to-understand data and setting representation;
- Shell extensions for fast access to R-Guard settings in Windows Explorer file properties;
- File/folder settings Wizard.
|
|
|
|
* Canadian residents add applicable taxes (GST)
||
||
||
||
© Copyright 2000-2005 R-tools Technology Inc.
|