![]() So far user of HiCrypt™ can log in to HiCrypt™-encrypted network drives using stored credentials. Required for this function is the feature “Token support” which has to be ordered with costs. ![]() At the same time logging in to a HiCrypt™-encrypted network drive can be defined to enforce using a security token. Thus password policies known from the operating system just like the periodically change of passwords or the complexity requirements for new passwords can be applied. HiCrypt™ 2.0 now supports the use of security policies – more exactly password policies and login policies. Network drives, which have been encrypted using an older version of HiCrypt™ can be upgrade in a few steps. Using this feature is downwards compatible. Thus HiCrypt™ 2.0 provides an even higher security for your confidential data. Using this feature the access to encrypted data can be combined with the requirement of a security token. This function requires the feature “Token support” which has to be ordered with costs. For logging in to HiCrypt™-encrypted network drives you can now use security token (smartcards and so on).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |