Whitenoise Computer File Security 5.0

License: Free Trial ‎File size: 7.70 MB
‎Users Rating: 2.9/5 - ‎9 ‎votes

SCM How did Wiki Leaks happen? A disgruntled employee with an agenda goes to work with USB flash drives and copies restricted files off of the server, because there is NO adequate secure network. Preventing the Wiki Leaks scenario and creating a secure network requires ONLY three things: 1. Secure network access. All users logging onto the network are identified by a UNIQUE key that performs dynamic identity verification and authentication (DIVA). 2. Secure data transmission. All data transmission occurs in an encrypted state. Secure File Interchange 2 (SFI) establishes a dynamic distributed key infrastructure (DDKI) framework. 3. Secure data storage. All data is automatically uniquely encrypted with a key related to the user’s name and password, and saved in a “virtual container” SPECIFIC to that user in an encrypted state. Whitenoise ensures 100% network security in the SIMPLEST manner to install, learn and use. Data is ALWAYS protected with UNIQUE identity based encryption so it is ALWAYS secure in transmission and storage. At any point when there is an unauthorized attempt to access files or functions, the INHERENT INTRUSION DETECTION instantly recognizes that DIVA is not in synch and the network self-protects by the AUTOMATIC REVOCATION of network access to that key. Whitenoise’s solution is scalable, interoperable and works with ANY kind of network. The three applications needed to secure a network can be integrated into ONE management console. Setting up employees’ computers and determining which files/folders/applications they can see and access is EASILY done by the system administrator through the normal Windows operating system interface. Learning and performing COMPLETE system administration and COMPLETE secure network setup and distribution of keys takes approximately two hours. Secure single-sign on network access and login is SIMPLE and requires NO training of employees. The system administrator can always recover data.

VERSION HISTORY

  • Version 4.0 posted on 2006-06-12
    Tested and Validated by. University of Victoria, British Columbia. University of Berkeley, California. GAIT Labs, British Columbia Institute of Technology. Government Vetting.
  • Version 5.0 posted on 2006-06-12
    Grand Finalist IFSEC 2011 - Grand Finalist Global Security Challenge 2010 - Presented to the United Nations ITU - White House OSTP - International Patents and Export permits granted - Secure Cloud Computing - Prevent Wiki Leaks scenarios - Works with any existing network security applications.

Program Details

EULA

Licenses are available for the deployment of Whitenoise and Dynamic Identity Verification and Authorization in third party products. END USER LICENSE AGREEMENT WHITENOISE LABORATORIES (Canada) INC.("WNL") GRANTS YOU A LICENSE AS FOLLOWS TO THE "WHITENOISE" PROGRAM: 1. LICENSE. WNL grants you a non-exclusive, non-transferable license for the "WHITENOISE" program (the "Program") including Whitenoise Personal File Security, Whitenoise Personal File Security, Whitenoise Network File Security, Gateway Authentication serve, all trial software, all associated Whitenoise utilities and its associated documentation, subject to all of the following terms and conditions: a. to use the Program on a single computer; b. to make copies of the Program for back-up purposes; 2. LIMITATIONS ON LICENSE. a. WNL owns the Program and its associated documentation and all copyrights therein. You may only use the Program as expressly provided for in this Agreement. 3. NO WNL OBLIGATION. WNL shall have no obligation to provide maintenance, support, upgrades or new releases to you. 4. NO WARRANTY OF PERFORMANCE. THE PROGRAM AND ITS ASSOCIATED DOCUMENTATION ARE LICENSED "AS IS" WITHOUT WARRANTY AS TO THEIR PERFORMANCE, MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE RESULTS AND PERFORMANCE OF THE PROGRAM IS ASSUMED BY YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 5. LIMITATION OF LIABILITY. EXCEPT AS EXPRESSLY PROVIDED FOR HEREINUNDER, NEITHER WNL NOR ANY OTHER PERSON WHO HAS BEEN INVOLVED IN THE CREATION, PRODUCTION, OR DELIVERY OF THE PROGRAM SHALL BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY DIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF WNL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 6. GENERAL a. This Agreement shall be governed by the laws of the province of British Columbia, Canada. The courts of British Columbia shall have exclusive jurisdiction over any dispute arising hereunder. b. Address all correspondence regarding this license to WNL's email address as follows: [email protected] .