Today, your data’s security is constantly under threat. A multitude of software applications, complicated IT solutions, and dependence on assistance from external IT companies are factors which are interfering with your security. These are the reasons why the CRYPTONOX project started.
Our project objective is to research and develop value-added products for protecting sensitive data. Implementing multiple security elements into a single unit is our priority. Our effort has resulted in sophisticated products with operations conditioned by constant, simultaneous presence of multiple protection elements. We are currently using several types of encryption.
Users of the CRYPTONOX product line are from individuals, groups, and business entities who:
CRYPTONOX focuses on cooperation between the following technological elements:
Software: is the program for protecting all types of files. Protecting files utilizes a strong encryption algorithm combined with a unique hardware key. Encryption and decryption requires a password which is generated and stored in the unique hardware key. The extensions of the encrypted files are not changed what providing convenience to work with secured files.
Hardware: the presents of the hardware key is needed for file encryption and decryption. The hardware device does not require any special driver installation. Each device has its own access password, which can be changed.
Password: A password must be entered to access secured files and the user may change this password at any time. This password is generated automatically based on a so-called seed code (max. 64 characters) selected by the user.