With the threats of data theft, system intrusions and interception of communications, data encryption has become an important part of daily lives.
What is encryption software?
Although transmission and data storage methods are generally secure, there is still some risk of it being stolen. To combat this, encryption software turns readable files or text into an unreadable format that cannot be decoded except by chosen parties. This is accomplished through the use of an algorithm, and once data is encrypted the only way to decrypt data is through an assigned key or password.
Software encryption has broad application:
For files or documents on a hard drive
- For files and documents on flash drives and USB keys
- For the transmission of email messages
- For packets of data that are transmitted over networks
- Database encryption
- Disk encryption
Encryption comes in various strengths, with weaker encryption being easier to intercept and decode. The current standard for software encryption is 128-bit, replacing the older 56-bit standard.
Types of encryption software
There are both free and paid versions of encryption software on the market for both personal and business use. Many paid versions come with a free trial that allows users to make sure that the software is the right fit for their needs.
Some of the most common encryption software available are:
- Secure IT
- File encrytopn XP
- Hide Folder Ext
- Norton 360
- Folder Lock
- Secrets keeper
- Kruptos 2 Professional
- Private file encryption
- Encryption Securiy Solutions LLC
- Advanced encryption package pro
When it comes to purchasing an encryption software package, making a decision based on the lowest price is not always the best option. Most are priced in the $40 to $150 range.
Other factors must be considered when they are looking for business-grade encryption software. These include:
The rating it received in reviews.
- Ease of use and implementation.
- The amount of data security that is provided. Data security features to look for include 256-bit encryption, data reliability, file shredding, password meter and generator, history cleaning and stealth mode.
- Operating system flexibility.
- Help and support features, like email, live chat, and call center support.
Thursday, January 14, 1999Groups condemn Wassenaar crypto pact Several privacy advocacy groups have condemned the recent revision of the Wassenaar Arrangement -- a protocol designed to limit the export of strategic military weapons -- which includes new controls on encryption software.