Simple Solutions
  • About us
  • IT Services
  • Legal
  • Healthcare
  • Financial
  • careers
  • Contact us

Information and Data Security

Simple Solutions offers quality services in Data Security , Data Extraction Services, Litigation Document Coding, Logical Document Determination.

  • Introduction to Legal Services
  • Litigation Document Coding
  • Logical Document Determination (LDD)
  • eDiscovery Services
  • E-Brief Hyperlink Services
  • Data Extraction Services
  • Data Security

Data Security

Legal Services

 

Data Security Systems Features

  • Total control over file/folder operations at the user & application level. Login monitor traces user activity: user login, logoff, etc from the local computer and network.
  • There are two types of access control: user-specific and process-specific access rights.
  • File isolation. Any file from any process.
  • True file/folder hidden attribute to make the file/folder inaccessible for any Windows program, unlike the Dos and Windows HIDDEN attribute.
  • File access blocking (Read\ Write\Rename\Delete)
  • Ability to block the start of any executable file (EXE DLL COM BAT HTML XML IS CLASS, 32/16 bit applications, Win32, Win 16, Dos, DPMI).
  • File system-independent extended attributes stored in a distributed database (UNIX-stile data security architecture). This allows the user to set extended attributes on removable network media.
  • File wiping to prevent unauthorized data recovery. Upon deleting, a file will be automatically wiped without further chance to recover deleted file. No need to wipe files manually.
  • Unauthorized file modification protection (CRC-128). If a file is modified by a user, that will block access to it until administrator finds the reason and source for that modification using the audit system.

Data Encription Systems Features

  • True-On-The-Fly-Encryption (TOTFE) allows the user to enter its password only once at windows logon.
  • Guarantee that a decrypted file will never appear in Windows swap files.
  • Strong Encryption. We use an industry standard AES encryption algorithm with 2S6-bit key in the Cipher Block Chaining mode.
  • Secure encryption key generation. We use a complex randomized block key and variable-length key generated from the user password (MDS algorithm)
  • Secure file transferring. Files from the remote storage are transferred in the encrypted form and decrypted only on the host.

File Monitor Features

  • Flexible and detailed monitoring of all operations for any file.
  • Processes - file operations linking.
  • File monitor log filtering and highlighting.
  • Powerful file monitor logs search by file masks and regular expressions.
© 2013 Simple Solutions. All Rights Resevered.
UP