Roxio unveils new secure product line
Posted on 02 July 2010.
Roxio announced the availability of Roxio Secure products which enable users within an organization to secure data on CD, DVD, Blu-ray Disc, and flash devices using powerful data encryption that safeguards the contents from being accessed by unauthorized persons.

Roxio Secure offerings go beyond simple encryption on stand-alone machines to provide advanced end-point security features for networks of computers in small workgroups to multi-departmental global enterprises.

Roxio Secure products are easy to set-up and deploy on networked PCs, securing enterprise data, and can be configured to be entirely transparent to the end user. This unique combination of capabilities ensures organizations can enjoy a high level of confidence for end-point security to avoid costly data loss incidents without giving up the flexibility and productivity benefits associated with portable media.

Roxio Secure Burn:
  • Burns data on CD, DVD and Blu-ray Disc using an easy drag & drop interface
  • Copies discs and disc image files
  • Encrypts data on disc using a FIPS 140-2 certified encryption module
  • Spans files too big to fit across multiple discs
  • Reads and writes disc image files
  • Includes dynamic language support in a single installer for international organizations.
Roxio Secure Burn Plus adds:
  • Discs can be read on PCs within permitted departmental groups of PCs
  • Restricts permission to read discs on PCs outside permitted departmental groups
  • Group read permissions are set at installation via command line
  • Read permissions can be changed after installation with the included Roxio Permissions Manager applet.
Roxio Secure Managed adds:
  • Discs can only be written by permitted users
  • Discs can only be read by permitted users
  • An authorization server controls permissions per organizational policies
  • Permissions can be changed in real time by the system administrator via a web control panel
  • Data on USB flash devices is encrypted, and can be destroyed if a device is lost or stolen
  • Supports logging and reporting of files burned to disc, files sent to USB devices, and administrative changes to permissions.





Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //