CryptioPro protects your company data on mobile storage media
CryptionPro® encrypts all data that is copied to external storage media. This happens automatically and reliably in
the background without disrupting the work of the user. At another workplace within your company, the data can be
read - again decryption happens fully automatically without users even being aware that it happens – with encryp-
tion being restricted to those groups or departments you have specified. Encrypted takes place at the file level,
which allows users to exclude specific files from being encrypted – if the appropriate permissions have been granted.
This may be necessary when you want to pass files, such as a presentations or other materials to a business partner
or if you copy files from and to somebody’s USB-stick. In addition, CryptionPro ® support a mobile encryption, allow-
ing you protecting sensitive data you may have been entrusted with on its way to your office.
Protects your company data or sensi-
tive data entrusted to your employees
in case of loss or theft
Meets legal data protection require-
Enables the secure use of mobile stor-
CryptionPo Mobile allows access to
your encrypted data anytime and any
Support for various encryption op-
tions: automatic encryption, file-based
Location-independent support: in the
company network or on the road
Support for a variety of encryption
algorithms: AES 256 Bit; Blowfish 256
Bit Select among a variety of encryption options and methods
Secure central password management
with master password
"If you consider the USB Ports open up Vulnerabilities
importance of corpo- The high capacity of today's USB devices allows
rate IT for business users to copy entire databases. This is an ex-
success, it soon be- tremely critical threat that could lead to a high
comes clear that we must not close our eyes to financial loss if no protective measures are
the fact that a lot of sensitive data regularly taken. Endpoints can only be reliably protected
leaves the company on mobile disks without through central and intelligent management.
any protection. Protective measures must be This includes access to USB ports, control and
automated, and neither allow bypasses nor logging of data transmissions, as well as the
impact user productivity. We therefore de- protection of data on mobile devices using
cided to partner with cynapspro. " secure encryption.
Herbert Uhl, CEO of Matrix42 AG
cynapspro Endpoint Data Protection
cynapspro develops software solutions for reliable
endpoint data protection in the enterprise network
and covers the following areas:
DevicePro prevents data loss through open ports and
external storage devices.
CryptionPro encrypts and protects your company
data on mobile storage media – fully automated.
CryptionPro HDD protects your company data by en-
crypting the hard drive.
ApplicationPro blocks unwanted applications and
prevents the use of unlicensed software.
ErasePro ensures that deleted files are not recover-
PowerPro cuts energy costs and reports suspicious
The following features distinguish all cynapspro pected data abuse or loss, cynapspro knows which
solutions: files have been accessed, by whom and when.
Intuitive Management Console Minimal System Requirements
The single user-friendly Management Console is Apart from a SQL database (the free MSDE or SQL
largely self-explanatory and only a minimum of train- Server 2005 Express edition are fully sufficient), there
ing is required. The clear and concise structure allows is no additional software required, such as the IIS
the compilation of complex setting with just a few Server or .NET client. Consequently, no new vulner-
mouse clicks. abilities are introduced by installing additional back
office software and memory and CPU utilization is
Real-Time Management minimal.
All changes to access permissions will be immediately
pushed out to the clients and stored in the cynapspro Secure Kernel Driver Technology
database. Users don’t need to restart their machines The secure cynapspro® kernel driver technology is
or even connect to the company network in order to loaded into the operating system during the boot
upgrade their usage rights. sequence and thus ensures that the service running
on the client is not visible to the end user. It can only
Rights Management at Group Level, User Level or be stopped or uninstalled by an authorized Adminis-
Computer Level trator.
Reduce your administrative effort. Manage individual
access rights directly with the respective users, Integration with Third Party Applications
groups or computers. An XML interface allows the allocation of access per-
missions from an existing customer Helpdesk or Ser-
Synchronization of User Directories vice Desk implementation in a fully automated way,
Existing users and user group definitions from Micro- leveraging existing processes, approval workflows,
soft Active Directory or Novell eDirectory are im- notifications and management reports. There will be
ported by the cynapspro server thus reducing the no need for service desk workers to use an additional
workload for defining user groups for Access Client console.
Lists (ACLs) as well as the sources of error.
Full Audit Log Several mutually replicating cynapspro servers pro-
Password-protected, detailed access statistics with vide load balancing capabilities in enterprise environ-
filter and sort order functionality. In case of sus- ments.
Free Trial Version Contact
On the cynapspro website, we offer a full version cynapspro GmbH
of our software for download, including a free 5- Am Hardtwald 1
user license. D-76275 Ettlingen
Please contact us if you are interested in testing Tel.: +49 7243 / 945-250
our software in a larger environment. Email: firstname.lastname@example.org
March 2010 - Copyright cynapspro GmbH 2010—All rights reserved.