Crypto Package Manager (CPM II) is a specialized application for strong encrypting files and folders located on local, networks, servers, or external data media.
The application allows the following actions:
Encrypt or decrypt selected files and folders;
Secure file packages;
Encrypting the files in the package;
Decrypting the files in the package;
File integrity check;
File modification control;
Checking the current status of files and directories etc.
The encryption of the files for which meta-information is available in the packages and which are physically accessible is performed based on session crypto mechanisms.
Each crypto mechanism uses a set of proven cryptographic primitives. Configuration of crypto primitives is done automatically.
All operations on the files and folders saved in the package are performed only when the files and folders are physically accessible. If they cannot be accessed (deleted, physically inaccessible network drive, or other reason), this will be reflected in the packet, recording the time when this finding was made.
FIELD OF APPLICATION
Protecting large arrays of files located on different media is a complex and difficult process to implement. The use of file packages allows the automation of this process, increases the efficiency of service, and significantly improves the security of corporate solutions.
Storing, editing, transferring, and destroying files is a process, the importance of which is often overlooked by both users and those responsible for security.
Statistics show that threats related to gaining unsanctioned access by unauthorized persons are related to this problem.
With the help of CPM, it is possible to neutralize all these problems through a highly effective professional cryptosystem using secure file packages.
CPM uses some of the most effective standard digital data encrypting algorithms used by government organizations and corporate structures.
The application allows the following actions:
Encrypt or decrypt selected files and folders;
Secure file packages;
Encrypting the files in the package;
Decrypting the files in the package;
File integrity check;
File modification control;
Checking the current status of files and directories etc.
The encryption of the files for which meta-information is available in the packages and which are physically accessible is performed based on session crypto mechanisms.
Each crypto mechanism uses a set of proven cryptographic primitives. Configuration of crypto primitives is done automatically.
All operations on the files and folders saved in the package are performed only when the files and folders are physically accessible. If they cannot be accessed (deleted, physically inaccessible network drive, or other reason), this will be reflected in the packet, recording the time when this finding was made.
FIELD OF APPLICATION
Protecting large arrays of files located on different media is a complex and difficult process to implement. The use of file packages allows the automation of this process, increases the efficiency of service, and significantly improves the security of corporate solutions.
Storing, editing, transferring, and destroying files is a process, the importance of which is often overlooked by both users and those responsible for security.
Statistics show that threats related to gaining unsanctioned access by unauthorized persons are related to this problem.
With the help of CPM, it is possible to neutralize all these problems through a highly effective professional cryptosystem using secure file packages.
CPM uses some of the most effective standard digital data encrypting algorithms used by government organizations and corporate structures.
Przegląd
CPM II fe to Freeware oprogramowanie w kategorii Bezpieczeństwo opracowane przez Gatelink Ltd..
Najnowsza wersja CPM II fe jest 2.5.0.0, wydany na 27.08.2023. Początkowo był to dodane do naszej bazy na 27.08.2023.
CPM II fe jest uruchamiany w następujących systemach operacyjnych: Windows. Pobierz plik ma rozmiar 16,9MB.
CPM II fe nie ma zostały ocenione przez naszych użytkowników jeszcze.
Darmowe bezpieczne pobieranie plików sprawdzonych przez UpdateStar
Bądź na bieżąco
z UpdateStar freeware.
z UpdateStar freeware.
Najnowsze recenzje
![]() |
Revo Uninstaller
Pożegnaj się z upartym oprogramowaniem dzięki Revo Uninstaller! |
![]() |
safeRweb
Chroń swoją prywatność w Internecie z safeRweb |
![]() |
Intel Driver & Support Assistant
Z łatwością aktualizuj swój system Intel |
![]() |
Autodesk Identity Manager
Bezpieczna i usprawniona kontrola dostępu dzięki programowi Autodesk Identity Manager |
![]() |
Epson Printer Connection Checker
Zapewnij bezproblemowe drukowanie dzięki narzędziu Epson Printer Connection Checker |
FastKeys
Zwiększ swoją produktywność dzięki FastKeys |
![]() |
UpdateStar Premium Edition
Aktualizowanie oprogramowania nigdy nie było łatwiejsze dzięki UpdateStar Premium Edition! |
![]() |
Microsoft Visual C++ 2015 Redistributable Package
Zwiększ wydajność swojego systemu dzięki pakietowi redystrybucyjnemu Microsoft Visual C++ 2015! |
![]() |
Microsoft Edge
Nowy standard przeglądania stron internetowych |
![]() |
Google Chrome
Szybka i wszechstronna przeglądarka internetowa |
![]() |
Microsoft Visual C++ 2010 Redistributable
Niezbędny składnik do uruchamiania aplikacji Visual C++ |
![]() |
Microsoft Update Health Tools
Microsoft Update Health Tools: Upewnij się, że Twój system jest zawsze aktualny! |