Overview

CyberAngel Security Solutions, Inc. has made it standard practice to provide innovative custom security solutions for corporate and consumer markets for the past 10 years. While many IT security products focus on protecting the network or servers, The CyberAngel concentrates on the workstation; whether it is a desktop, laptop, or tablet computer. We understand that, like physical security, IT security products need to be able to work within different environments, and have different regulations to adhere to when designing a security system. The CyberAngel® with Wi-Trac is an adaptive product, a hybrid of several technologies to provide a comprehensive solution set. The CyberAngel® with Wi-Trac blends Authentication, Data Encryption, Remote Access Restriction, as well as Tracking and Recovery in the event of theft to provide a strong tool to use in the protection of your computer data and assets.

“Real-Time Security” – Strong User Authentication

The CyberAngel® Authentication offers Single Factor and Two-Factor Authentication modes, depending on the level of security required. Violation of The CyberAngel Authentication instantly protects the information, data, applications and utilities that you feel are sensitive or critical on that computer. “Real-Time Security” for your computer and the information contained within. The CyberAngel will immediately search for some type of connectivity to alert of that violation.

“Real-Time Security” – Data and Information Protection

The CyberAngel® Secure Drive protects your confidential data, preventing unauthorized access to your files, company financials, patient/client information, or corporate business plans. If your computer is stolen, and/or The CyberAngel authentication is violated—your sensitive data and information is encrypted and protected as well as rendered invisible to that “unauthorized user or thief”. This “Real-Time Security” is a solid compliance tool for medical or financial information privacy. Proprietary applications can also be placed within the Secure Drive, prohibiting their use by an unauthorized user or thief. The CyberAngel® with Wi-Trac’s “on-the-fly” encryption is transparent and lightning fast, and with all of our security features synced to The CyberAngel® Authentication, this patented comprehensive IT security tool truly provides…“One Computer Program – One Password – 100% Security!”

  • Available encryption algorithms: Rijndael-AES 128 or 256 bit, Two-Fish 128 or 256 bit, Blowfish 128 or 448 bit, DES or Triple DES
  • Prevents unauthorized users from seeing the Secure Drive and files within
  • Provides Compliance with HIPAA, GLB, SOX, FISMA, and GISRA and State Breach Laws

Tracks, Locates, and Recovers Lost or Stolen Computers

When The CyberAngel® Authentication is breached at login or boot-up, it silently transmits an alert to our Security Monitoring Center, where we identify the location from which that computer is calling. The “unauthorized user or thief” is unaware that an alert is being transmitted. If that computer has been reported stolen, then our Recovery Team helps coordinate notice to all necessary law enforcement officials and works closely with them to provide a rapid recovery of your stolen computer. The CyberAngel® with Wi-Trac is the only company to offer Wi-Trac technology, the first indoor/outdoor laptop positioning system that utilizes Wi-Fi to accurately pinpoint the computer location. With the market today in excess of 80 million portable computing devices, The CyberAngel® with Wi-Trac is the best possible way to locate stolen assets.

 

Additional “Real-Time Security” Features

  • Prohibits Unauthorized Remote Access
    Prevents VPN technologies from operating—-prohibiting access to your remote network.
  • Prevents Unauthorized Application Use
    Prohibits applications placed in the Secure Drive from operating—protecting such financial programs as Quicken, Peachtree, or databases such as ACT or Goldmine
  • Locks Communication Ports
    Prevents unauthorized use of any Dial-up Networking utility—preventing access to your remote network server or online accounts
  • Notification of Unauthorized Access
    Provides immediate notification (via e-mail and/or fax) of any unauthorized access attempts—allows for rapid response to track and locate breaches in security