Software Cryptosystems designed to level 1 of FIPS PUB 140-1|
with DOD 5220.22-M countermeasures to forensic data recovery
"Access control" products obstruct the use of your copy of Windows® to read data stored on your hard drive. They have no effect on the ability of another PC or laptop to plug into the standard connector on that hard drive and read its contents. Such reading by forensic software can automate "recovery" of sensitive data remnants.
Sensitive data recovered from "temporary" files that Windows® has "deleted" can allow side channel attacks to bypass encryption with even the strongest ciphers.
Using a program to create encrypted copies of your data to e-mail provides no protection from recovery of the unencrypted copies of that data which Windows® helps other programs to scatter around your hard drive when you edit it or print it.
If you must leave a Windows® PC or laptop unattended, it is possible to protect your data cryptographically, but only if you also eliminate all those leaked extra copies; and do so to standards designed to thwart forensic disk data recovery techniques.
Since Windows® leaks sensitive data into many kinds of locations on a hard drive, merely "wiping free clusters" is, of course, not sufficient to counter forensic software. Nor is "wiping file slack" that is only applied to file tails, and not the interior spaces into which Word®, Excel® and similar programs can scavenge sensitive plaintext.
To counter forensic software attacks, we offer our INFOSEC Products.
NOTE: Our cryptosystems are considered "encryption items" - Category EI in the Commerce Control List, 15 CFR 774, subject to the Export Administration Act, 50 USC 2401. The penalty for their export from the United States without a BXA license, except to Canada is a fine, not to exceed $1,000,000 and/or a prison term, not to exceed 10 years, for each offense.
If you're not sure whether or not you need cryptographic data protection, take a look at ENCRYPT or NOT? - things you should consider. We also provide an on-line library of applicable (U.S.) federal cryptographic security standards, and a set of tutorials on the problems of meeting them in the INFOSEC-hostile Windows® environment.
If you decide to entrust your business to us, rest assured that our customers' names, addresses and e-mail addresses are held confidential and are not sold to others.