SlideShare a Scribd company logo
1 of 20
Download to read offline
DATA STORED ON YOUR PC
IS NOT SAFE
The traditional storage systems do not protect more
your privacy
The traditional storage systems do not protect more
your privacy
DATA STORED ON YOUR PC
IS NOT SAFE
Data theft
Traceability
Our security is
always in danger
News archive
Bank Hackers Steal Millions via Malware
Nearly 1 million new malware threats
released every day
Data, personal records and financial information
stolen and sold on the black market 
Our security is
always in danger
Today
Cyber attacks are constantly
taking place, and you can even
see a real time map showing their
extension here.
Antivirus updates
Firewall
Secure passwords
Internal network protection
IP filters
Access Control Software
File Vaults
Behavioural rules
The adopted
security
measures…
Antivirus updating
Firewall
Secure password
Internal network protected
IP filters
Control access software
File Vault
Behavioural rules
…may be useless
because:
Business management
requires flexibility
Companies need to manage
critical situations
Security policies can be
altered
Data security at risk
A secure environment where you can work
without fearing for your data security.
All in a single USB key.
Dart Key: the reliability
you need
The best solution for your security
Dart Key provides many applications for editing,
management and data transmission, images,
audio and secure video communication, web
surfing and email management.
An application suite for
data management
Dart Key: what is it?
Malware
Virus
Data theft
Hacking
Protected from
intrusion and malware
Fast and easy access
How to use
Within the USB device you can find all the
features of an operating system that you can use
from any PC and always in your pocket.
Keep your data safe
Encryption and Backup
To ensure your data security, files on your Dart Key
are automatically encrypted with the most
sophisticated encryption algorithms.


Choose how to save your data:
Use the Simple Backup or the Encrypted Backup.

AES-256-cbc
RSA 2048
Used to protect categorized data
Used to encrypt digital signatures
WHIRLPOOL Hash algorithm used to ensure data integrity
BACKUP Based on True Crypt
Web and Email in
private mode
Browser & Email
Send encrypted emails and browse the web
anonymously using Tor, the Dart Key integrated
browser.
TOR
MAIL
Access the web, without risk for your privacy
Send email safely
Share your files and folders
in a secure way
Data transmission
Make your data available to other Dart Key users
through the private cloud and protect them with the
encryption.
LOCAL ENCRYPTION
Exchange data using encryption techniques based on asymmetric and secret
keys.
PRIVATE CLOUD
Dart Key offers a private cloud solution to facilitate content sharing.
Join the Club and
get in sync
Club
With Dart Key you can create an exclusive
group with your team where you can share
private data safely.
Secured audio and
video communication
Communication
Communicate with other Dart Key users safely
using encryption to protect your privacy.
Choose the Private
Cloud security
Work without risks
Work without
leaving a trace
A world of advantages
included in your Dart Key
ENCRYPTION MANAGEMENT
Your data is protected by the strongest
levels of encryption
Bring your data with you and connect
securely from any PC
PRIVACY SECURITY
Surf the web and communicate without
giving up your privacy
Your files are inaccessible from the outside in
case of theft or loss
PRIVATE CLOUD
Choose the private cloud designed to
protect business data
Dart Key

More Related Content

What's hot

9i R2 Checklist
9i R2 Checklist9i R2 Checklist
9i R2 ChecklistLiquidHub
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore
 
How Google Protects your Data
How Google Protects your DataHow Google Protects your Data
How Google Protects your DataThomas Igou
 
Advanced data governance in Office 365
Advanced data governance in Office 365Advanced data governance in Office 365
Advanced data governance in Office 365Albert Hoitingh
 
One click protection in microsoft office
One click protection in microsoft officeOne click protection in microsoft office
One click protection in microsoft officeSeclore
 
Data Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustryData Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustrySeclore
 
Information Security
Information Security Information Security
Information Security Dio Pratama
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
10 Steps To Global Data Compliance
10 Steps To Global Data Compliance10 Steps To Global Data Compliance
10 Steps To Global Data ComplianceGrant Fritchey
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance SolutionsSeclore
 
ECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationCiaran Comerford
 
Innovative Security Group Official Flyer
Innovative Security Group Official FlyerInnovative Security Group Official Flyer
Innovative Security Group Official FlyerPaul Mashauri
 

What's hot (17)

9i R2 Checklist
9i R2 Checklist9i R2 Checklist
9i R2 Checklist
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel Program
 
How Google Protects your Data
How Google Protects your DataHow Google Protects your Data
How Google Protects your Data
 
Advanced data governance in Office 365
Advanced data governance in Office 365Advanced data governance in Office 365
Advanced data governance in Office 365
 
One click protection in microsoft office
One click protection in microsoft officeOne click protection in microsoft office
One click protection in microsoft office
 
Data Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustryData Security For Pharmaceutical Industry
Data Security For Pharmaceutical Industry
 
Securing physical security
Securing physical securitySecuring physical security
Securing physical security
 
Tresorit intro - Europas 2014
Tresorit intro - Europas 2014Tresorit intro - Europas 2014
Tresorit intro - Europas 2014
 
Information Security
Information Security Information Security
Information Security
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Fire walls
Fire wallsFire walls
Fire walls
 
10 Steps To Global Data Compliance
10 Steps To Global Data Compliance10 Steps To Global Data Compliance
10 Steps To Global Data Compliance
 
Cisco security
Cisco securityCisco security
Cisco security
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
Cyber
CyberCyber
Cyber
 
ECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint Presentation
 
Innovative Security Group Official Flyer
Innovative Security Group Official FlyerInnovative Security Group Official Flyer
Innovative Security Group Official Flyer
 

Similar to Dart Key ENG

Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The CloudOmer Trajman
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsAndris Soroka
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxchWaqasZahid
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Exclusive Networks ME
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
SecuredBox - Secure your privacy
SecuredBox - Secure your privacySecuredBox - Secure your privacy
SecuredBox - Secure your privacySecuredBox
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsMicky Metts
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tipspgmaynard
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingDigital Shende
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionIan Ray
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz BrochureIan Ray
 

Similar to Dart Key ENG (20)

Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The Cloud
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
SecuredBox - Secure your privacy
SecuredBox - Secure your privacySecuredBox - Secure your privacy
SecuredBox - Secure your privacy
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz Brochure
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 

Dart Key ENG

  • 1. DATA STORED ON YOUR PC IS NOT SAFE The traditional storage systems do not protect more your privacy
  • 2. The traditional storage systems do not protect more your privacy DATA STORED ON YOUR PC IS NOT SAFE Data theft Traceability
  • 3. Our security is always in danger News archive Bank Hackers Steal Millions via Malware Nearly 1 million new malware threats released every day Data, personal records and financial information stolen and sold on the black market 
  • 4. Our security is always in danger Today Cyber attacks are constantly taking place, and you can even see a real time map showing their extension here.
  • 5. Antivirus updates Firewall Secure passwords Internal network protection IP filters Access Control Software File Vaults Behavioural rules The adopted security measures…
  • 6. Antivirus updating Firewall Secure password Internal network protected IP filters Control access software File Vault Behavioural rules …may be useless because: Business management requires flexibility Companies need to manage critical situations Security policies can be altered Data security at risk
  • 7. A secure environment where you can work without fearing for your data security. All in a single USB key. Dart Key: the reliability you need The best solution for your security
  • 8. Dart Key provides many applications for editing, management and data transmission, images, audio and secure video communication, web surfing and email management. An application suite for data management Dart Key: what is it?
  • 10. Fast and easy access How to use Within the USB device you can find all the features of an operating system that you can use from any PC and always in your pocket.
  • 11. Keep your data safe Encryption and Backup To ensure your data security, files on your Dart Key are automatically encrypted with the most sophisticated encryption algorithms. 
 Choose how to save your data: Use the Simple Backup or the Encrypted Backup.
 AES-256-cbc RSA 2048 Used to protect categorized data Used to encrypt digital signatures WHIRLPOOL Hash algorithm used to ensure data integrity BACKUP Based on True Crypt
  • 12. Web and Email in private mode Browser & Email Send encrypted emails and browse the web anonymously using Tor, the Dart Key integrated browser. TOR MAIL Access the web, without risk for your privacy Send email safely
  • 13. Share your files and folders in a secure way Data transmission Make your data available to other Dart Key users through the private cloud and protect them with the encryption. LOCAL ENCRYPTION Exchange data using encryption techniques based on asymmetric and secret keys. PRIVATE CLOUD Dart Key offers a private cloud solution to facilitate content sharing.
  • 14. Join the Club and get in sync Club With Dart Key you can create an exclusive group with your team where you can share private data safely.
  • 15. Secured audio and video communication Communication Communicate with other Dart Key users safely using encryption to protect your privacy.
  • 19. A world of advantages included in your Dart Key ENCRYPTION MANAGEMENT Your data is protected by the strongest levels of encryption Bring your data with you and connect securely from any PC PRIVACY SECURITY Surf the web and communicate without giving up your privacy Your files are inaccessible from the outside in case of theft or loss PRIVATE CLOUD Choose the private cloud designed to protect business data