Solved

Folder Encryption

Posted on 2013-10-24
4
239 Views
Last Modified: 2014-03-19
Can someone recommend the best Folder Encryption software for Windows currently on the market?

Thank you!
0
Comment
Question by:Darrell Kirby
4 Comments
 
LVL 6

Expert Comment

by:loopfinity
Comment Utility
could you please be specific, free or paid?
Below comparison list may give you an initial idea:
http://encryption-software-review.toptenreviews.com/
0
 
LVL 22

Assisted Solution

by:Nick Rhode
Nick Rhode earned 167 total points
Comment Utility
One I don't mind is CompuSec.  Its free and easy to use.

http://www.ce-infosys.com/english/free_compusec/free_compusec.aspx
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 166 total points
Comment Utility
http://www.experts-exchange.com/Security/Encryption/A_12134-Choosing-the-right-encryption-for-your-needs.html
Crypto/Encryption is only as good as the weakest link, if you're not protecting the keys then it doesn't matter what product you use. Keep the keys separate, read about the caveats TrueCrypt has when it comes to encryption. It's the most honest product out there, and no product is any better at any "weakness" they document than they are.
-rich
0
 
LVL 14

Accepted Solution

by:
Giovanni Heward earned 167 total points
Comment Utility
I highly recommend TrueCrypt with multi-factor authentication.

TrueCrypt permits cascading of strong 256-bit encryption ciphers, such as AES-Twofish-Serpent (recommended)

TrueCrypt Algorithms
Meaning the Serpent layer is encrypted with a Twofish layer, which is encrypted with an AES layer.

At the end of the day these are all symmetric (private key) ciphers, meaning the protection provided is dependent upon not only how strong your private key (password) is but also how well protected that key remains.

Consider a password with sufficient haystack search depth to thwart brute force attempts.

One idea to consider is selecting a file or phrase for use as the password, and then creating a SHA256 hash against it.  You would then use the SHA256 hash as your password.

For greater security, you want to implement 2-factor authentication (something you know , something you have, or something you are)

For example, using TrueCrypt in conjunction with a password (something you know) and YubiKey (something you have).  TrueCrypt supports other options, such as tokens and smart cards.

If you want to keep things simple, consider storing your folder on an IronKey.  You could also consider creating a TrueCrypt volume on your IronKey as well.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now