Under Our Hood
Here we explain
how we employ up-to-date techniques and methods for your
safety security success. The easier a device is to use the
more complicated and advanced the electronics and
engineering under the hood - out of sight. Driving your car
is a good example. About 4,000 components work in unison to
get you from A to B safely by polling your driving every few
milliseconds and adjusting components through your
ExtremeCitadel ExtremeTomb ExtremeDrive and ExtremeSentinel are designed for the ease-of-use and management of "Top Secrets" anytime anywhere always secured and protected. They are designed and brutally tested to stop uninvited "aliens" performing unwanted , unauthorised activities behind your back. ExtremeCrypt carefully ensures all network and internet traffic is monitored real-time , and stopped if not used by the programs and services in use at that time Our world class secured IP telephony systems let you talk freely in complete unhackable comfort .
Safety-Security On The Move
They sit in ExtremeSentinel . The first Encrypt Single Files encrypts single files using your security key. This is useful if you have a large
"Top Secrets" file to be transferred.
The other is the most powerful program in its class. It is best suited when you want to bundle a set of files EG 20mb-500mb of "Top Secrets" . First the files are compressed and archived , a form of encryption then you setup a full strength encryption by entering your security key twice. Again you get at least 250 years protection.
All ExtremeCrypt security tools their operation and "Confusion" Stealth Strategies are offered to clients when they receive their security key to login to Client Access after receiving their products.
The Private Network allows secure global file transfers between ExtremeTomb clients anytime anywhere . When ExtremeTomb - with ExtremeSentinel - colleagues form their "Closed Circuit" this secure network allows larger volumes of files - 200mb up to 2GB- depending on location and internet speed All share a single logon facility and are logged onto their Private Network . You all see each others "secure folder" which holds the "Top Secrets" to be moved and you have a chat facility to decide what files are moved between the group. Members can be local 20Klm's away or global , 6000 Klm's . A further safeguard is to archive and encrypt "Top Secrets" before moving them.
ExtremeCommunicator is a world leading global secure voice-to-voice , video , file transfer system that needs security key permission to setup a connection. ExtremeCrypt users exchange security keys to use when either wants to connect. Then with at least 650kbps bandwidth voice video and file transfer can be used , conferencing can also be setup.It is also used to provide clients with Remote Desktop help and advice wherever the client is Extreme Phone.One of the worlds best easy-to-use systems that incorporates the latest streaming security technology which means NOBODY can listen in Adding deleting editing contacts is quick and clean, connections are quick and there is provision for conference calling.
ExtremeCrypt has done extensive research and real world testing on the above products with the aim of letting clients enjoy a NO MORE EMAILS fully secured stress free communications and file transfers environment regionally and globally.
Unwitting Practices And Security Loopholes
ExtremeCrypt must know because our clients manage files a couple of steps above the monthly coffee and cookie order.
ExtremeCrypt also installs a worlds-best-practice anti virus package and sets it to fully protect you. This is ranked by many as the No 1 - we have used it for 5 years very successfully -and we set it up to perform full real-time scanning of your RAM , internet traffic , email and attachments and its "sandbox" is activated to move anything suspect into it while you decide what to do. The firewall and the anti virus and your standard user account (See below) will stop physical intrusion but up to 15% of internet security breaches occur through emails (See Above) which can only be cured by mailserver administrators blocking all outside emails - not an option - so you need to scrutinise every email before just clicking it open , if it looks funny or too different just Delete now and ALWAYS go to spam and delete everything as well and once a week go to your web browsers Tools > Delete Browser History tick ALL the boxes and Delete and at least once a month cleanup your inbox and empty your Delete folder.
ExtremeTomb notebook arrives to you with two user accounts setup. The Administrator account -the one we use to setup ExtremeTomb - the one you normally use and a standard user account. ALWAYS use the standard account when on the internet because standard users do not have access to important Administrator permissions and if anybody does hack its harder to get your "Top Secrets" .
ExtremeCitadel Domain server is owned by the Trusted Persons group. It sits in your Domain but is specifically setup locked down and locked out of normal Domain Controller and Domain Administrators control and management functions. ExtremeTomb Trusted Persons can logon and perform their "Top Secrets" folders and files management. It is fully prepared ,ready to plug into to your Domain and start work with our guidance.
ExtremeDrive is a portable locked down "office in a pocket" designed to allow Trusted Persons to move current "Top Secrets" around in a timely fashion between other Trusted Persons. It can be used with Extremecitadel and ExtremeTomb.
ExtremeSentinel is your optional powerful hidden Start Menu. It contains your essential security and communication tools as well as personal daily task programs. Together it allows you to keep all your personal and private computing hidden and locked . Your security key unlocks it when you open ExtremeVault the unseen unknown untouchable volumes in ExtremeTomb and ExtremeDrive which lock hide and secure "Top Secrets" for 250 years
Now when you work with your ExtremeCitadel ExtremeTomb ExtremeDrive you have some idea of whats happening Under Our Hood.
Happy and Secure computing and be aware of the real Threats To You
- Top of Page For Guidance Assistance Sales Resellers Partners EmailThe Extremeteam Office CopyRight Xtreemtechnology'sİ 2006