Limited This deal maybe time limited. Don't miss it out! Promo Info Note: 1. Once entered Online Store, please click Buy On-line at the bottom of the page to select your license. 2. Once entered Online Store, please use Volume Licensing page to order a combined package of software licenses.
Click "Get It Now" Button above or below to activate this coupon code or deal. It's only valid on SoftCns.com If The Coupon Code Not Available Please bookmark this page first, and then clear the cookies of your browser. Lastly, restart your browser again or try to use another web browser, If you don't get it clearly, please visit Coupon Using Guide or send us expired.
R-Crypto is an easy-to-use disk encryption software that protects your confidential information and personal data on a desktop, notebook, or a removable data storage device against unauthorized access.
To protect the data R-Crypto creates encrypted virtual disks (virtual data storage devices). These disks provide real time data encryption and decryption which are fully transparent to the user, it means that the data is being encrypted just before it is being written to the disk and is being decrypted right after it is being read from the disk without the need of user intervention. All data (such as file and folder names, and content of all files) stored on such disks is constantly encrypted. The access to data on the virtual encrypted disk is impossible unless the user provides a correct password. At the same time, all file and disk operations for connected virtual encrypted disks are performed the same way as for standard disks.
All data of the encrypted virtual disk is stored together with the disk meta-data in a single file-container. That means that a virtual encrypted disk is actually an ordinary file that can be stored on any data storage device, like a hard drive, USB-disk, CD, DVD, or a network resource, and can be easily transferred to another computer or backed up.
R-Crypto encrypts the data on virtual disks using the cryptographic infrastructure of the Microsoft Windows operating system. This infrastructure allows the users to use various installable cryptographic service providers, including those that are already pre-installed. For example, Microsoft AES Cryptographic Provider is one of the pre-installed cryptographic service providers in Windows XP and Vista that implements the modern and most secure encryption algorithm: Advanced Encryption Standard (AES) with key length of 128, 192, and 256 bits.
Such approach allows the users to select themselves the cryptographic sub-system that satisfies their requirements. It also reduces limitations on the use of R-Crypto in companies that require certification for such products to meet certain governmental or corporate standards.
Simple and easy-to-use interface • R-Crypto Management Panel providing access for the user to all actions of the system. • Wizard guiding the users through the creation of encrypted disks. • List of the most frequently connected encrypted disks (can be disabled). • Configurable list of auto-connected encrypted disks. • Change the size of the encrypted disk easily. • Access to encrypted disk control actions outside the R-Crypto Management Panel directly from the Windows shell (for example, connect/disconnect). • Special icon for connected encrypted disks in the Windows shell (can be disabled). • Access to most R-Crypto actions from the Windows system tray.
Safe and reliable data encryption and protection • Users can use various cryptographic service providers, both pre-installed in the Windows operating system and available from the third parties. • Disk free space encryption (can be disabled). • Wizard guiding the users through the disks re-encryption. • Ability to connect an encrypted disk in the read-only mode. • Configurable hot keys to disconnect either all connected encrypted disks, or each disk separately. • Automatic disconnection of all connected encrypted disk upon user's logoff. • Ability to automatically disconnect the encrypted disks upon screensaver startup, entering the hibernation mode, or computer lockup. • Ability to automatically disconnect the encrypted disks upon encrypted disk file-container storage media is removed from the system. • Ability to automatically disconnect the encrypted disks upon exceeding an encrypted disk inactivity period. Inactivity period is a period of time when the connected encrypted disk is not being used, that is it is a period of time when no data is being read from the disk or being written to the disk. • Ability to enforce the disconnection of locked encrypted disks upon automatic disconnection. • File-containers of the connected encrypted disks are protected against re-writing and deletion. • Wipe encrypted disks for secure deletion..
Using over network • Ability to create and connect encrypted disks' file-containers located on any accessible network location; • Connecting an encrypted disk emulating a "local disk" to provide access for remote users (required for Windows XP and later versions); • Automatic saving and restoring of the encrypted disk network sharing options.
Advanced usage • Ability to connect the encrypted disk to an empty NTFS folder (e.g. C:\path-to-empty-NTFS-folder\). • Support for system disk utilities (check disk, defragmentation, etc.). • Command-line utility to manage encrypted disks' connections.
• R-Crypto Home Use license allows installing the software on home, non-commercial computers and devices owned or leased by the Licensee only. The software may not be used for commercial gain of any kind.
• R-Crypto Corporate license allows installing the software on one workstation or server. The license is per user and can be transferred to another Licensee's PC provided that Licensee may not install the software on more than a single PC at the same time.