Home
EasyLock™ User Manual Intuitive Encryption Application
Contents
1. Password Confirm Password Password reminder Password Info Ready to proceed Push lt Apply gt when ready Start Password Finist Click Finish to continue cososys cososys 4 3 Password retries Each time the application starts you will be asked for security reasons to introduce your password For that case that your drive was lost or stolen the number of password retries is limited to 10 ten After the password has been entered wrongly 10 ten times in a row EasyLock will safely erase all encrypted files stored on the portable storage device The data on the portable storage device can thereafter not be recovered or recreated It is permanently erased 4 4 Using Drag amp Drop to copy files A key feature of EasyLock is the Drag amp Drop functionality which allows you to simply drag the file s and or folder s that you want to copy on the device and drop them onto the window of EasyLock These files will be automatically encrypted ensuring that your data stay safe and private EasyLock we 080 ome e ea My Pictures Name Size Date A My Documents 11 10 2009 E p My Computer s WINXPSP2EN C s Win D lt Local Disk E De optimizat Devel 2 WORK lt Local Disk F C Documents and Settings Guest My Docu godfather1 jpg a panei ES eee AU Fes po paste files here gt New Co
2. EasyLock User Manual fm Intuitive Encryption Application for portable Storage Devices User Manual Version 1 0 0 8 O 2004 2010 CoSoSys Ltd cososvs Table of Contents Table or COMMENTS stecssnaccactitenasenaceseccdeaiinansantveasedeceunbuienseceasnseness 2 De Introduction iisisti anned eaae a aaa a 3 2 System Requirements asscsissasissasasonsossanacasoaiaionscanadasaaciasscras vataversesoumuaten 4 3 INStaNaBOM since dcwaneuaeddwuduaueswananmeudesnvewive ia nana tada 5 4 Working with EasyLock anseia ais sa 6 4 1 Setting up EasyLock a nan in Ra an 6 4 2 Setting up a Password 6 4 3 Password retries isisiiaiiani dana saia as iii gd is 9 4 4 Using Drag amp Drop to copy files 9 4 5 Opening and modifying files within EasyLock 11 4 6 Security SOMOS sas atas HT di ado nos ii fa 12 5 Trusted Device Levels ss mibmenmnsaads 13 6 How EasyLock works with Endpoint Protector or My Endpoint Protector ss sssrnntnneenssaein nt nie O e 14 7 Configuring TrustedDevice use in Endpoint Protector or My Endpoint PROLE ON ci zine drone aa 16 Safely Remove Hardware sn sonasdanHenasadasdna saia san io 17 Es FM OU T A E a 18 10 Important Notice Disclaimer ss 19 cososys 1 Introduction Protecting data in transit is essential to ensure no third party has access to data in case a device is lost misplaced or stolen EasyLock allows portable devices to be identified as Tru
3. evel with strong hardware based encryption that is mandatory for sensitive enterprise data protection for regulatory compliance such as SOX HIPAA GBLA PIPED Basel II DPA or PCI 95 46 EC Requires special hardware that includes advanced security software and hardware based encryption and that has been tested for TrustedDevice Level 3 Level 4 Maximum security for military government and even secret agent use Level 4 TrustedDevices include strong hardware based encryption for data protection and are independently certified e g FIPS 140 These devices have successfully undergone rigorous testing for software and hardware Requires special hardware that is available primarily through security focused resellers cososys 14 6 How EasyLock works with Endpoint Protector or My Endpoint Protector When using EasyLock on a portable storage device as a TrustedDevice Level 1 in combination with Endpoint Protector or My Endpoint Protector the hosted SaaS Solution it will ensure that all data copied from an Endpoint Protector secured Client PC to the device will be encrypted Normal Scenario for the use of a TrustedDevice Level 1 is 1 User connects device to Endpoint Protector protected Client PC 2 Device is checked for authorization client PC is communicating with Endpoint Protector Server to check for authorization 3 If device is an authorized TrustedDevice Level 1 and the User or Machine is authorized to use TrustedDe
4. evice using Explorer is not recommended cososys cososys 11 We recommend using either the Drag amp Drop feature or the shortcut keys for copying and pasting Ctrl C and Ctrl V to transfer data to your portable storage device though the EasyLock interface In the toolbar area of EasyLock you can find additional icons that you can also use to copy and encrypt your files w5ibBo0oome 0 Note that the files on your portable storage device are not visible after encryption unless EasyLock is running To exit EasyLock select the File menu and choose Exit or simply click the X button in the upper right corner of the application window 4 5 Opening and modifying files within EasyLock Copied data on device can be viewed and edited directly from within EasyLock This function is accessible with the Open command or double clicking the desired file The user has to open documents from the device with the associated application EasyLock will try to close these documents once it has exited If a document is modified saved with the same name or even to the same folder it will be encrypted and stored on the device If a document is modified and saved but fails to be encrypted for example when the device is unexpectedly removed it will be encrypted the next time EasyLock is started Attention When EasyLock is started by Endpoint Protector as a trusted application opening documents from the device option is disab
5. he Rights tab 4 Working with EasyLock 4 1 Setting up EasyLock To start EasyLock simply double click the EasyLock exe that is saved in the root folder of the portable storage device When using the portable storage device as a TrustedDevices in combination with Endpoint Protector the Client PC that the device is connected to must have received authorization from the Endpoint Protector server otherwise the device will not be accessible on an Endpoint Protector protected PC or EasyLock will not autostart 4 2 Setting up a Password In order to secure encrypt your data you will need to set up a password The password must be at least 6 six characters long For security reasons it is recommended that you incorporate letters numbers and symbols into your password Password Finish se Follow the menus and directions lia cososvs cososys cososys Click Next to proceed Start Password Set Password Password Confirm Password o Password reminder Finish Password Info Please enter a new password The password must have at least 6 characters It is recommended that you incorporate letters numbers and symbols for maximum security Enter your password and then confirm it It is recommended that you also set up a password reminder that will help you in case you forget your password
6. led as the associated application does not have access to the files cososys 12 4 6 Security settings The security settings can be modified from within EasyLock After logging in you can modify you password To do this you need to access the security settings menu This can be done by either selecting Options gt Security Settings from the toolbar area or by pressing the hotkey Ctrl O gt Easylock File Edit Password Settings Change Password il Old Password E New Password 9 e Confirm New Password eeseee gt testme New Password Reminder Password Info Ready to proceed Click lt pply gt when ready cososys 13 5 TrustedDevice Levels There are four levels of security for TrustedDevices Level 1 Minimum security for office and personal use with a focus on software based encryption for data security Offers companies already regulatory compliance Any USB Flash Drive and most other portable storage devices can be turned into a TrustedDevice Level 1 with EasyLock Software from CoSoSys No hardware upgrade is required Level 2 Medium security level with biometric data protection or advances software based data encryption Requires special hardware that includes security software and that has been tested for TrustedDevice Level 2 Hardware is widely available in retail stores Level 3 High security l
7. mpilation M meme 3 Documents o Cancel My Documents ooreo My Documents 9 1 2009 My Musi 5 29 2008 D My Virtual Machines 9 1 2003 06080015 JPG 753 KB 10 25 2006 06080016 JPG 790KB 10 25 2006 06080017 JPG 312 KB 10 31 2006 5 06080018 JPG 361 KB 1 18 2007 led nenanma IPR on KB 10 95 9006 Ready NUM SCRL 10 The file encryption and transfer status can be seen with the help of the progress bar When the bar reaches the end your files have been copied and encrypted EasyLock File Edit View Options Help woBQomeae Name Size Date ajj Size Date My Documents 11 10 2009 i 11 13 2009 4 My Computer lee WINXPSPZEN C eee Win D E Es Local Disk E j 9KB 11 13 2009 De optimizat 8 24 2009 Thumbs db 3KB 11 13 2009 E Devel 10 30 2009 Hig WORK 11 13 2009 s Local Disk F s Local Disk G Hs Local Disk H Eb New Compilation M Documents 1 9 2008 My Documents 11 10 2009 EXC My Documents 9 1 2009 i 3 My Virtual Mach 9 1 2009 E 06080015 JPG 10 25 2006 E 06080016 JPG 10 25 2006 E 06080017 JPG 10 31 2006 5 06080018 JPG 1 18 2007 lea nengnm a IPR 10 96 9006 v NUM SCRL Clicking on an item with the right mouse button will give you access to options such as Refresh Copy and Delete Copying files from your HDD to the portable storage d
8. nauthorized persons and CoSoSys disclaims any warranties to that effect to the fullest extent permitted by law 2004 2010 Copyright CoSoSys Ltd Endpoint Protector My Endpoint Protector TrustedDevices and EasyLock are trademarks of CoSoSys Ltd All rights reserved Windows and NET Framework are registered trademarks of Microsoft Corporation All other names and trademarks are property of their respective owners
9. rtable storage device from the USB port of your computer you have to use the Safely Remove Hardware option from the system tray otherwise you risk corrupting the data on your USB Drive especially when using Windows 2000 To Safely Remove Hardware double click on the system tray icon then select the USB Drive you want to remove from the list and click on the Stop button Lea ss PE gt Safely Remove Hardware Select the device you want to unplug or eject and then click Stop When Windows notifies you that it is safe to do so unplug the device from your computer Hardware devices amp USB Mass Storage Device USB Mass Storage Device at Location 0 Properties Stop C Display device components Close A message will appear indicating that the portable storage device can now be securely removed If a message saying The device cannot be stopped right now appears you have to close your Windows Explorer EasyLock or any other application that is still accessing the data on the USB Drive cososys 18 9 Support In case additional help such as the FAQs or e mail support is required you can visit the support website directly at http www cososys com help html cososys 19 10 Important Notice Disclaimer Security safeguards by their nature are capable of circumvention CoSoSys cannot and does not guarantee that data or devices will not be accessed by u
10. stedDevices in combination with Endpoint Protector and protects data on the device with Government approved 256bit AES CBC mode encryption With the intuitive Drag amp Drop interface files can be quickly copied to and from the device for fast secure and efficient workflow EasyLock is a portable application that does not require any installation process on the host PC and is always portable Wherever the portable storage device goes EasyLock is saved on the device and can be used on any Windows XP Vista and Windows 7 PC cososys cososys 2 System Requirements Operating Systems e Windows 7 all versions e Windows Vista all versions e Windows XP Service Pack 2 is recommended e Windows 2000 Service Pack 4 Available USB port Removable USB Storage Device to start the application from e g USB Flash Drive External Hard Drive Memory Card etc If the portable storage device has a manual write protection switch lock it must be in the unprotected writable position to be able to use EasyLock EasyLock does not require Administrative rights cososys 3 Installation To install EasyLock on a USB flash drive or other portable USB storage device simply copy the file EasyLock exe to the root folder of a partition associated with that device If EasyLock is used in combination with Endpoint Protector access to TrustedDevices can be configured from the Global Rights module of Endpoint Protector under t
11. vice Level 1 the EasyLock software on the device will automatically open 4 User can transfer files via Drag amp Drop in EasyLock 5 Data transferred to the devices is encrypted via 256bit AES 6 User cannot access the device directly using Windows Explorer or similar applications e g Total Commander to ensure that no data is copied on the portable device without being properly encrypted 7 User does not have the possibility to copy data in unencrypted state to the TrustedDevice on an Endpoint Protector client PC 8 All file transfer from an Endpoint Protector client PC to the device can be recorded if file tracing and file shadowing are activated in Endpoint Protector Actions such as file deletion or file renaming are also recorded 9 Administrators can later audit what user with what device on what PC has transferred what files 15 If a TrustedDevice fails to get authorization from Endpoint Protector it will not be usable by the user The device will be blocked and the user will not be able to access the device cososys cososys 16 7 Configuring TrustedDevice use in Endpoint Protector or My Endpoint Protector To learn how to configure the use of TrustedDevice in combination with Endpoint Protector please consult the Endpoint Protector User Manual To find out more about Endpoint Protector visit www EndpointProtector com cososys 17 8 Safely Remove Hardware Before you unplug your po
Download Pdf Manuals
Related Search
Related Contents
iGrants User Manual - District Untitled - Caminho Digital User Manual - Rackmount Solutions Pro PDFファイル Plantronics Pulsar 590A Bluetooth Headset Virus Manual Deutsch 2 - ソニー製品情報 Copyright © All rights reserved.
Failed to retrieve file