Detailed information about abylon ENTERPRISE

Technical product description of the safety suite:

The comprehensive security suite abylon ENTERPRISEvon abylonsoft offers innovative and professional security and encryption solutions for private and business use.

This software supports the public key system according to PKCS (RSA) and works in the HYBRID system completely on the basis of X.509 Internet certificates. Alternatively, symmetric encryption (SYMM system) with password entry or the use of EC/KV cards is offered. This makes the protection of your secret data against unauthorized reading simple and yet secure. Depending on the module, text documents, images and videos can be encrypted with the Blowfish algorithm (key length 448 bits) or the AES algorithm (key length 256 bits).

Signed files, i.e. files digitally signed by you, can no longer be changed without the recipient knowing. This means that nothing stands in the way of sending files via unsecure channels (e.g. via email on the Internet). Especially secure are the so-called Secure Message Envelopes (SME's = sign and encrypt in one step).

For the HYBRID system, all X.509 certificates are managed in the integrated certificate manager with connection to the Windows certificate database. The use of external tokens (smart card and USB token) is thus possible without any problems. The public keys are automatically stored during verification (verification of the signature), can be retrieved from LDAP servers or simply exchanged via email. In addition, the selection of the encryption and signature procedure, encryption for several recipients (multicrypting), the creation of self-signed certificates (for private use), the use of backup certificates and the manual or automatic verification of certificates for its validity (revocation list) is supported.

In the password safe, your passwords and access data are stored securely in an encrypted XML file and can be retrieved at any time.

For example, you can store all your important data or even install entire programs on the encrypted virtual drive. After unlocking, the virtual drive is displayed normally in MS File Explorer and encryption and decryption according to the Blowfish algorithm (key length 448 bit) or AES algorithm (key length 256 bit) is performed automatically and without noticeable delay in the background.

The logon solution offers you the possibility to log on to your computer with your certificate chip card, the USB token, a processor chip card or a memory chip card (e.g. also EC card or health insurance card) and thus increase the security of your system. After pulling the corresponding token, your computer can automatically Blocked, Logged or Download.

For your security all modules are checked against manipulation by viruses or other external attacks.

uvm...

Functional scope of the software for your security:

For more details see the product pages of the individual modules and the new features and improvements on the Versionshistory page!

System requirements:

  • Processor: Pentium (or comparable)
  • Main memory: 512 MByte RAM
  • Free hard disk space approx. 100 MByte
  • operating system Windows XP, Vista, Win 7, Win 8, 2003, 2008, WTS, 32 and 64bit
  • screen resolution: min. 1024x600 Pixel
  • Optional smart card reader and certificate smart card or USB token

Supported standards:

  • CAPI (Microsoft Crypt API),
  • PKCS#7 (Cryptographic Message Syntax Standard)
  • PKCS#11 (Cryptographic Token Interface Standard)
  • PKCS#12 (Personal Information Exchange Syntax)
  • RSA
  • PC/SC
  • RC4, 3DES...
  • X.509 v3 Certificates
  • Microsoft Certificate Database
  • Blowfish and AES algorithm
  • compression in ZIP format
  • Deleting according to the Peter Gutmann and DOD method

Technical Information of the Security- and Encryption Tools Collection:

  • Installation and uninstallation routine
  • Certificates (X.509 v3) can be generated
  • Driver for smart card reader or USB token has to be installed separately