DATA Security

22

description

DATA Security. Data on your computer , contains documents and information about your career or private life . control access to these datas digital envirinment. - PowerPoint PPT Presentation

Transcript of DATA Security

Page 1: DATA Security
Page 2: DATA Security

DATA SecurityDATA Security

• Data on your computerData on your computer, contains , contains documents and information about documents and information about youryour career career oror private life private life. control access to . control access to these datas digital envirinment.these datas digital envirinment.

• Computer hardisk or flash disk and Computer hardisk or flash disk and external disks are most popular data external disks are most popular data storge devices. These devices are storge devices. These devices are portability and high memory capacity.portability and high memory capacity.

Page 3: DATA Security

• Theft, copying and lost may Theft, copying and lost may result in private information result in private information being viewed by other people. being viewed by other people.

DATA SecurityDATA Security

Page 4: DATA Security

• CCloud technology will be more loud technology will be more important soonimportant soon with developing with developing technologytechnology..

• As cloud computing grows in popularity, As cloud computing grows in popularity, thousands of companies are simply thousands of companies are simply rebranding their non-cloud products rebranding their non-cloud products and services as “cloud computing.”and services as “cloud computing.”

DATA SecurityDATA Security

Page 5: DATA Security

CCloud technology will prevent the loss loud technology will prevent the loss of data.of data.

However, the end-userHowever, the end-user not to trust not to trust cloud technologycloud technology because of the because of the personal data securitypersonal data security

DATA SecurityDATA Security

Page 6: DATA Security

• CiscoCisco:: cloud traffic will increase 6 times cloud traffic will increase 6 times stated in the next 2 years.stated in the next 2 years.http://www.btnet.com.tr/60388-ciscoya-gore-5-yil-icerisinde-bulut-trafigi-6-kat-artacak.html

• Symantec: “Secure cloud technology”Symantec: “Secure cloud technology”

http://www.btnet.com.tr/61054-symantec-gelecegin-bulut-guvenligi-haritasini-cizdi.html

DATA SecurityDATA Security

Page 7: DATA Security

• DData theft is one of the most ata theft is one of the most important issues of today.important issues of today.

• http://teknobak.com/bulut-hizmeti-yeni-yasa-ile-kara-bulut-hizmeti-oldukullanicilar-tehlikede_6_54465?utm_source=dlvr.it&utm_medium=twitter#.UZnXwKLxpI0

• In recent days, United States prism In recent days, United States prism summarizes everything.summarizes everything.

DATA SecurityDATA Security

Page 8: DATA Security

“You can not measure what you do not know, if you can not measure, you can not control.”

• WWhat our values are under control in the digital hat our values are under control in the digital world?world?

In other wordsIn other words

• Can we make sure that only the relevant data Can we make sure that only the relevant data under our control ourselves?under our control ourselves?

Ask yourself this questions.Ask yourself this questions.

Page 9: DATA Security

You can You can encryptencrypt datas with datas with securKEY. securKEY.

PPreventrevent to to theft of information in theft of information in this way.this way.

DATA SecurityDATA Security

Page 10: DATA Security

• securKEY protected files can be of securKEY protected files can be of any size and any type of file.any size and any type of file.

• Encrypted data can be Encrypted data can be portableportable in in the cloudthe cloud, local disk, memory disk, , local disk, memory disk, flash disk and network shareflash disk and network share..

Page 11: DATA Security

What is securKEY?What is securKEY?

• securKEY is a USB securKEY is a USB hardware devices. hardware devices. IImages, videosmages, videos and and documents documents areare provides provides security by encryptingsecurity by encrypting

Page 12: DATA Security

What is NOT securKEY?What is NOT securKEY?

• securKEY is not a Flash DisksecurKEY is not a Flash Disk• information can not be transferred information can not be transferred

into securKEYinto securKEY

Supports all file types stored on your PCSupports all file types stored on your PC. . The The same key is not used in any way. Use the same key is not used in any way. Use the unique product key.unique product key.

Page 13: DATA Security

Two Factor SecurityTwo Factor Security

•Two-factor authentication system, Two-factor authentication system, "something you know" and "something you "something you know" and "something you have" and recognizes youhave" and recognizes you. N. Next to the ext to the password you want to have a security key. password you want to have a security key. Two-factor authentication systems with the Two-factor authentication systems with the user information in a way that you have stolen user information in a way that you have stolen something will not work without.something will not work without.

•securKEY offers a two-factor security system.securKEY offers a two-factor security system.

Page 14: DATA Security

The algorithm can read The algorithm can read someone else?someone else?

• SecurKEY stored and used only in SecurKEY stored and used only in key algorithm. For this reason, your key algorithm. For this reason, your computer or disk encryption (the computer or disk encryption (the media) would not be no trace on the media) would not be no trace on the algorithm.algorithm.

Page 15: DATA Security

• securKEYsecurKEY is not work with is not work with certificate- certificate-based, algorithm-based algorithm works based, algorithm-based algorithm works producedproduced. All algorithms are unique.. All algorithms are unique.

• This This uniqueunique algorithm, each document is algorithm, each document is protected through encrypted with different protected through encrypted with different keys.keys.

• Even if the document is protected by the Even if the document is protected by the same key is never usedsame key is never used..

Page 16: DATA Security

Difference is other USB Difference is other USB products;products;

•OOther products, the data contain ther products, the data contain encrypted fields.encrypted fields.

•We encrypt the data and relate the We encrypt the data and relate the device of USB.device of USB.

Page 17: DATA Security

• securKEY hardware, software and securKEY hardware, software and engineering with 100% engineering with 100% locallocal production. production.

• Only use are imported crypto processor.Only use are imported crypto processor.

• Our product is patented and all Our product is patented and all trademark rights belong to our trademark rights belong to our company.company.

Page 18: DATA Security

securKEY'in Technical securKEY'in Technical Specifications Specifications

•Microprocessor-Based Architecture•securKEY works microprocessor-based. securKEY processors in the world uses one of the most preferred projects for military purposes. A system which can not be used to copy. •Embedded Encryption Algorithm•securKEY 256-bit AES encryption engine.

Page 19: DATA Security

• Line Security Algorithm (the world's first and only)

Unlikely to repeat the incoming and outgoing data through the line

~ 8.135 * 10 ^ 2311 'is 1 in. So it is impossible to obtain significant data lines even listened.

 • Driverless USB SupportsecurKEY are automatically recognized by the

operating system, users do not need to install any driver.

Page 20: DATA Security

• Detection of unauthorized communication to lock yourselfsecurKEY; When it detects an unauthorized attempt to communications

device or function implements the two-stage locking. Operational trials process itself and the partial locks this lock can be opened only by our company, administrative process, the device completely locks itself.

  PRODUCT FEATURES• Microprocessor-Based Protection• Embedded 256-bit AES Encryption Engine• Rados repetition Data Flow System• Uniqe Algorithm• USB Interface• Non Requiring the installation drive.• To lock itself when it detects unauthorized communication• Compatible with Windows 98 SE, 2000, 2003, 2008 Server, XP, Vista, Windows 7,

Windows 8• 2 Year Warranty

Page 21: DATA Security

Physical Physical PPropertiesropertiesLength 51 mm Width 18 mm Height 9 mm Weight 4 grConnector USB Type APlastic Materials ABSOperating Temperature

-40 °C – + 85 °C

Operating Voltage 3 V – 5.25 VOperating Current 14 mA – 27 mAData Storage Time 10 YearNumber of Memory Writing

50,000

Standard CEWarranty 24 MonthProduction site TürkiyeManufacturer BT Yazılım Bilgi

Teknolojileri

More Information: More Information:

www.securKEY.com.trwww.securKEY.com.tr

Page 22: DATA Security

Thank You!Thank You!