Products Header
ProductsServicesDownloadsAbout NAI
ContactSite MapSearch
Security
Products MenuProducts MenuProducts MenuProducts MenuProducts MenuProducts Menu

PGP For Business Security 5.5 ®
The worldwide de facto standard for email and file security

•Overview  •Datasheet  •Reviews and Awards  •Press Releases  •Download PDF Datasheet  •White Papers  •System Requirements 

Overview

No matter how complex your computing environment, PGP for Business Security gives you the world's easiest, fastest, and most powerful way to safeguard your organization's digital assets. It combines the world's strongest commercially available cryptographic capabilities with simple key generation and flexible management tools to deliver the ideal security solution - today and as your business grows.

Back to Top

Datasheet

Industrial-Strength
Security for Digital Assets

PGP for Business Security is a scalable, cross-platform solution that enables users to protect electronic correspondence, online transactions, and data files by encrypting them so that only the intended recipients can decipher the contents. Because PGP products contain only strong cryptographic algorithms and key lengths, PGP for Business Security provides the ultimate protection by securing data stored on computers and in transit over intranets and the Internet. For added security, PGP incorporates powerful digital signature capabilities that verify authorship as well as the integrity of documents.

Flexible, Simple Security Administration

PGP for Business Security includes a full suite of key generation and management tools that gives security administrators flexible control over corporate security policies. Using PGP's Administrative Wizard, for example, administrators can set key generation configurations; require encryption for all email messages sent by a set of users; enable corporate message recovery; and limit the ability of users to perform certain actions, such as key generation. To assure the validity of keys, administrators also can create a hierarchical and/or Web-of-Trust framework of individuals trusted to sign keys.

Easy to Administer, Easy to Use

PGP for Business Security is so easy to use that even novices can learn to encrypt, decrypt, digitally sign, and verify messages and files in a matter of minutes. And because it works seamlessly with popular productivity tools, email applications, operating systems, and the PGP Certificate Server, PGP for Business Security can be easily deployed throughout an organization.

USER FUNCTIONS

  • User-specified or automatic encryption and digital signing of email and attachments
  • Folder encryption to safeguard local files
  • Wipe to securely remove original files
  • Group recipient list for encrypting email to multiple recipients
  • Plug-ins for popular email programs and desktop toolbar for easy, convenient access to cryptographic functions
  • Default simplified representation of trust model to accommodate novice users
CRYPTOGRAPHIC ALGORITHMS SUPPORTED
  • Public key algorithms: Diffie-Hellman/ DSS, RSA
  • Hash functions: MD5, RIPEMD-160, SHA-1
  • Symmetric algorithms: CAST, International Data Encryption Algorithm (IDEA), Triple-DES
APPLICATIONS AND DOCUMENTS SUPPORTED
  • Seamless email integration with:
    • Claris Emailer for Macintosh
    • Microsoft Exchange for Windows 95 and Windows NT 4.0
    • Microsoft Outlook for Windows 95 and Windows NT 4.0
    • Netscape Communicator 4.0 for Windows, Macintosh, and UNIX QUALCOMM Eudora for Windows 95, Windows NT 4.0, and Macintosh
  • Documents:
    Any file, including text, spreadsheet,
    audio, or video Clipboard contents
    (Macintosh and PC)
PGP CERTIFICATE SERVER SUPPORT
  • Synchronization of local keyrings and PGP Certificate Servers
  • Advanced search and retrieval of public keys on local keyring or Certificate
Server by:
Key creation date
Key expiration date
Key ID
Key size
Public key algorithm
Revocation status
Signature status
User ID or subset
  • Key Server Preferences dialog to specify searchable and default Certificate Servers
  • Local and published signatures
ADMINISTRATIVE CAPABILITIES
  • Administrator Wizard for custom configuration of PGP before it is installed on each user's personal computer:
    • Corporate message recovery configurable for inbound and outbound messages
    • Disable use of conventional (symmetric) encryption
    • Disable key generation
    • Passphrase strength control (minimum length and quality)
    • Warn if user encrypting to keys not certified by corporation
    • Configurable comment text in message block
    • Specification of default keys on every user's local keyring
    • Support for centralized hierarchical and/or Web-of-Trust security models
Highlights
  • The strongest commercially available encryption software (minimum 128-bit) for use with all documents in any format, including text, spreadsheet, graphics, video, and audio
  • Unforgeable digital signatures for verifying authorship and integrity of messages and files
  • Intuitive user interface
  • Scalable, cross-platform architecture
  • Choice of cryptographic algorithms
  • Fast search and retrieval of public keys from corporate or public PGP Certificate Servers
  • Corporate message recovery without key escrow
  • Integration with popular email packages including Claris Emailer, Microsoft Exchange, Microsoft Outlook, Netscape Communicator, and QUALCOMM Eudora
  • Customizable security configuration, easy installation and administration

Back to Top

System Requirements

  • Microsoft Windows 95 or
  • Windows NT 4.0 with 8 MB of RAM and 15 MB of free disk space
  • Macintosh system 7.5.3 or later with 68030 processor or later, 8 MB of RAM, and 10 MB of free disk space
  • UNIX systems running Sun Solaris 2.5.1 or later,
  • HP-UX 9.0 or later
  • IBM AIX 3.2.5 or later
  • SGI IRIX 5.2 or later, or
  • Linux 1.2.13 or later; plus 8 MB RAM and 8 MB of free disk space
The PGP Total Network Security (TNS) line is a key component of Network Associates' commitment to providing solutions for managing and securing your network.

Find out more about our total line of solutions for network management and security. Talk to your Network Associates sales representative today.

Back to Top

 

 

© 1998, Network Associates, Inc. and its affiliated Companies. All Rights Reserved.

 

McAfee Nuts and Bolts!