Jersey City, NJ, March 10, 2009 — Six-pound laptop computers can each carry as much information as several five-foot filing cabinets. How perfect they are for transporting information, across town or across the ocean.
Thieves see them the same way. A stolen laptop computer or mobile device can yield a rich trove of data. With stolen information, thieves can fraudulently use information to steal money, or worse, damage brands and corporate goodwill.
Comodo Security Solutions, Inc.'s Disk Encryption offers easy-to-use protection for businesses who want to protect their information from falling into the wrong hands. Using security algorithms, Comodo Disk Encryption encrypts any drive partition or even virtual partitions, without disrupting computer usage or performance.
Password authentication allows computer users to set passwords as access authentication keys to encrypt the required drives.
For added security, users and administrators can choose to require a USB memory stick in order to access the encrypted drives. The USB stick acts as a key to unlock the protected information.
Combining password and USB authentication produces the most secure disk encryption Comodo offers. Using both at the same time qualifies as "two-factor authentication" required by many regulations such as the PCI DSS and FFIEC.
Comodo Disk Encryption can be used on mobile and desktop computers alike. With Comodo Disk Encryption, users have powerful control over their machines, including specifying who may start a specific computer, or keeping one partition of a shared computer "off limits." USB key users who want to make their information unrecoverable-anywhere-need only destroy their USB keys.
Comodo Disk Encryption continually protects sensitive data, giving the computer user both powerful control and unprecedented freedom to carry it where it is needed without fear of compromise. For more information visit Comodo Disk Encryption.
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software; Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet's ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and has over 10,000,000 installations of desktop security products.
For additional information on Comodo - Creating Trust Online® visit our website.
For more information, reporters and analysts may contact:
Comodo--Creating Trust Online