Many companies attempt to implement a security policy involvingencryption of portable data, but the policy has no way to be enforcedunless the portable drive utilizes hardware encryption, or alternatively,utilizes encryption software installed on the computer to encrypt the dataloaded onto the portable drive.This simplest method of enforcing encryption is to implement a policyexclusively allowing only the use of hardware encrypted flash drives thatdo not have partitions. This way, if a drive is lost, data stored on the driveis secure because there is no way to load data on the drive without it beingencrypted. This is often not the case with USB flash drives that utilizesoftware-based encryption. In these cases, the user has the optionwhether to store data in an encrypted partition or a non-encryptedpartition. If the flash drive is lost, the assumption must be that the data isnot secure and it opens the organization up to liability if there was anychance that personal identifiable information existed on the drive.Personal Identifiable Information might take the form of employeeinformation,Customer records or patient records, and regulations exist to enforcepenalties in these situations.For example:• Nearly every U.S. state has implemented data breach reporting laws andpenalties that range from $250 to $750 per record of personal identifiableinformation that is lost• Some states are beginning to enforce the use of encryption and storageof personal information• The European Union and Canada have implemented serious mandatesfor transmission of personal information, especially in regard to employees
• The U.S. Federal Government’s HITECH Act, further strengthens existingHIPAA regulations in regard to ensuring portable data is using properencryption security processes or the healthcare institution or partner risksup to $1.5 million in fines per violation• Federal Information Security Act (FISMA) of 2002 established broadsecurity requirements for U.S. Federal Government agencies andcontractors and the OMB Memorandum M-06-16 requires that agenciesencrypt all data on mobile devices unless the agency has determined thatdata to be non-sensitive. FIPS 140-2 establishes cryptographicrequirements and security levels for encrypting data.• The Federal Trade Commission (FTC) will be implementing Red Flag Rulesfor the financial institutions that enforce steps that will prevent identitytheftProtect your sensitive files and folders with Clape - unique encryptiontechnology with an abundance of security options. This encryptionprogram sports a colorful and useful graphical interface, easy to use forthe uninitiated, yet powerful enough for the tech savvy. It providescomplete privacy, protecting your data from loss, theft, or virus attacks.Incorporated into the software are unexpected security “extras” thatprovide peace of mind for those obsessed with protecting their invaluabledata. On the surface these additional elements seem like icing on the cake,but in reality they are necessary to ensure total security. ClapeTechnologies has put a lot of thought into the creation of this program.Clape is the #1 choice when it comes to protecting your data. No othersecurity utility provides all the features of high encryption, secure deletion,stealth mode and speed of conversion in one easy-to-use package for totalsecrecy.Clape is straightforward and installs in less than a minute. No help isneeded when installing the software. Using the program is simple, justdrag and drop files and/or folders to the “FILE /FOLDER LIST” thenencryption starts automatically.
Another method the user can apply is click on “Import” Menu Item andselect file/folder to encrypt it.Should you encounter any difficulty while using the software, a wellillustrated users guide is incorporated into the program.Data Security:Clapes security is robust with 1024 bit encryption. Decryption wastransparent and showed no signs of lag even when playing a 1.7GB videofile. The original files are shredded after encryption, leaving no remains onthe users PC, and file integrity was maintained after decryption. . Shouldthe user decide not to create a password, the password generator utilitywill securely accomplish the task.Feature Set:Features at a glance:Patent Pending Encryption Technology1024 Bit Block EncryptionFacility of Recovery of forgotten passwordFacility of Recovery of DataFile SearchDrag and Drop File Import (By Default in Encrypted Mode)Keep a backup copy elsewhereAuto lock after inactivity periodChange Password / Encryption KeyQuick Text EditorFacility for selecting Random Password (Most Unique Feature)
USAGE:A folder of files (.docs, videos, .pdfs, .txt, .zip) totaling 4 GB in size wasused to test the encryption and decryption speed of Clape. It took fourminutes to complete the encryption procedure. Decrypting files wastransparent and showed no performance hit. The Export, Import optionallows the user to encrypt, decrypt, or lock without going through themain program.Help and Documentation:Clape has a built in help system with well illustrated graphics. If more helpis needed, the other choices are email (online form), knowledge base(FAQs - frequently asked questions), how-to’s, on-line blog, tutorials,postal address and social networking sites (Facebook, YouTube, Twitter,etc.).Summary:USB FLASH DRIVES HAVE BECOME HUGELY POPULARThey are the most convenient way to transfer large amounts ofdata.They use little power, are long lasting and reusable.They work with any USB-equipped computer.THERE IS A DOWNSIDE - “THE USB PROBLEM”Tens of millions are lost yearly.When a flash drive is lost, valuable data is exposed.Loss of confidential data can have a devastatingeffect on an organization.To erase off all this problem Clape has been envisaged anddeveloped for the users.