Content Encryption for Network Folders, Files, e-Mails and USB Devices.
- 21 September, 2004 15:17
<p>For immediate release</p>
<p>Auckland, New Zealand, 21st September, 2004.</p>
<p>TPP Group, a leading provider of enterprise computer security solutions announced today the availability of SafeBoot CE (Content Encryption), a solution for encrypting files and folders in the network environment.</p>
<p>TPP are the New Zealand distributor for the SafeBoot suite of security products including SafeBoot Enterprise device encryption, a solution that encrypts the entire hard drive of a mobile device such as a laptop, tablet pc or PDA.</p>
<p>“Now with SafeBoot CE users with the same rights can share access to encrypted files across a network and maintain the encryption of files wherever they are saved” says Ced Bradbury, CEO, TPP Group NZ.</p>
<p>Wherever a file is saved, including USB devices, CD’s and DVD’s it remains encrypted. CE is also integrated with e-mail programs, allowing users to easily encrypt e-mail attachments.</p>
<p>With SafeBoot CE, key executive groups within an organisation can be assured of the confidentiality and privacy of corporate documents stored across the computer network, even if network management is an outsourced arrangement. Further, SafeBoot CE incorporates a Central Management facility allowing fast deployment and easy administration.</p>
<p>About TPP NZ
TPP Group (The Peripheral People Pty.Ltd.) has specialised in IT security since 1983. Our customers are in numerous industry sectors, and many have deployed our solutions since our beginning.
TPP’s products are the leaders in the industry with acknowledgement from Meta Group, Secure Computing Magazine and others. Our sales and technical support teams are experts in the product range and deliver excellence in customer service.
Contact: Andrew Baussman, NZ Manager, TPP Group NZ,
Phone 09 522 8272; Cell 027 447 22 33</p>
- Two Linux bugs let remote attackers knock out network devices with low-traffic attacks
- Cautious optimism greets government’s encryption-interception plans
- The first rule of data-breach response? Don’t panic
- Technology in Government - Cyber threats today and tomorrow
- Five questions every CSO should be able to answer