The CyberAngel® Security Software is a comprehensive approach to providing security for the workstation, whether it be a desktop or laptop computer. Our patented technology allows us to provide ”

Provides “Real-Time Security” – Strong User Authentication

The CyberAngel® Authentication offers Single and Two-Factor Authentication modes, depending on the level of security required. Violation of The CyberAngel Authentication instantly protects the information, data, applications and utilities that you feel are sensitive or critical on that computer. “Real-Time Security” for your computer and the information contained within. The CyberAngel will immediately search for some type of connectivity to alert of that violation.

Provides “Real-Time Security” – Data and Information Protection

The CyberAngel® Secure Drive protects your confidential data, preventing unauthorized access to your files, company financials, patient/client information, or corporate business plans. If your computer is stolen, and/or The CyberAngel authentication is violated-your sensitive data and the information is encrypted and protected as well as rendered invisible to that unauthorized user. This “Real-Time Security” is a solid compliance tool for medical or financial information privacy. Proprietary applications can also be placed within the Secure Drive, prohibiting their use by an unauthorized user or thief.

Available encryption algorithms: Rijndael-AES 128 or 256 bit (New U.S Encryption Standard), Twofish 128 or 256 bit, Blowfish 128 or 448 bit, DES or Triple DES
Prevents unauthorized users from seeing your Secure Drive and the file names within
Provides Compliance with HIPAA, GLB, Sarbanes-Oxley, FISMA, and GISRA
Compatible with all current Windows® platforms.

Tracks, Locates and Recovers Lost or Stolen Computers

When The CyberAngel® Authentication is breached at login or boot-up, The CyberAngel® Security Software’s patented technology silently transmits an alert to our Security Monitoring Center, where we identify the location from which that computer is calling. The “unauthorized user” is unaware that an alert is being transmitted. Our Recovery Team helps coordinate notice to all necessary law enforcement officials and works closely with them to provide a rapid recovery of your stolen computer.

Additional “Real-Time Security” Features

Prohibits Unauthorized VPN Access

Prevents VPN technologies from operating–prohibiting access to your remote network.

Prevents Unauthorized Application Use

Prohibits applications placed in the Secure Drive from operating—protecting such financial programs as Quicken, Peachtree, or databases such as ACT or Goldmine.

Locks Communication Ports

Prevents unauthorized use of any Dial-up Networking utility-preventing access to your remote network server or online accounts. It also prohibits unauthorized data transfer from that computer to a PDA, Pocket-PC, or Smart-Phone.

Notification of Unauthorized Access

Provides immediate notification (via e-mail and/or fax) of any unauthorized access attempts—allows for rapid response to track and locate breaches in security.