SCM How did Wiki Leaks happen? A disgruntled employee with an agenda goes to work with USB flash drives and copies restricted files off of the server, because there is NO adequate secure network. Preventing the Wiki Leaks scenario and creating a secure network requires ONLY three things:
1. Secure network access. All users logging onto the network are identified by a UNIQUE key that performs dynamic identity verification and authentication (DIVA). 2. Secure data transmission. All data transmission occurs in an encrypted state. Secure File Interchange 2 (SFI) establishes a dynamic distributed key infrastructure (DDKI) framework. 3. Secure data storage. All data is automatically uniquely encrypted with a key related to the user?s name and password, and saved in a ?virtual container? SPECIFIC to that user in an encrypted state. Whitenoise ensures 100% network security in the SIMPLEST manner to install, learn and use. Data is ALWAYS protected with UNIQUE identity based encryption so it is ALWAYS secure in transmission and storage. At any point when there is an unauthorized attempt to access files or functions, the INHERENT INTRUSION DETECTION instantly recognizes that DIVA is not in synch and the network self-protects by the AUTOMATIC REVOCATION of network access to that key. Whitenoise?s solution is scalable, interoperable and works with ANY kind of network. The three applications needed to secure a network can be integrated into ONE management console. Setting up employees? computers and determining which files/folders/applications they can see and access is EASILY done by the system administrator through the normal Windows operating system interface. Learning and performing COMPLETE system administration and COMPLETE secure network setup and distribution of keys takes approximately two hours. Secure single-sign on network access and login is SIMPLE and requires NO training of employees. The system administrator can always recover data.
What's New in this Release: Grand Finalist IFSEC 2011 - Grand Finalist Global Security Challenge 2010 - Presented to the United Nations ITU - White House OSTP - International Patents and Export permits granted - Secure Cloud Computing - Prevent Wiki Leaks scenarios - Works with any existing network security applications.
Link to Whitenoise Computer File Security sample code
Security & Privacy::Encryption Tools
Date Added: Oct 31, 2006
Last check for an update: Feb 22, 2017
Last version date: Jun 12, 2006
Downloads Total : 1
Downloads last 10 Days: None
Page Visit: 132
Malware Status: Clean
Scan Date: Mar 24, 2008