PEM CompanionManage passwords and secure sensible data with encryption. | |
Download |
PEM Companion Ranking & Summary
Advertisement
- Price:
- Free
- Publisher Name:
- By 3Q Elsonet
- Operating Systems:
- Windows 10, Windows 8, Windows Vista, Windows, Windows 7, Windows XP
- Additional Requirements:
- Java Virtual Machine (JVM)
- Total Downloads:
- 142
PEM Companion Tags
PEM Companion Description
Main Features: - Password management: generated, store, delete, modify and retain all previous versions of the passwords - Securing the information: encrypt own messages and files - Securing the communications: encrypting messages and files at communication with partners - Permanently delete certain files on disk - Self-destruct ALL DATA (of this application) in case of hacker attempts to guess your master password. What is different: - The passwords are not archived anywhere. - Every personal message and file is encrypted with its own key. These keys are not archived. Other Functions Passwords management : - Can create passwords in your desired language by setting its own alphabet, created by the user. - Creates strong and unique non-guessable passwords. - Password length can be between 4 and 32 characters. - The password can contain, at your choice, digits, lowercase, uppercase, symbols - User-friendliness: easily creates new passwords and facilitates their replacement on a site by "keeping" the previous password. - Protect personal passwords WITHOUT STORING THEM (never saved anywhere) in the software, on the device or in the cloud, so if your device is stolen, the information remains protected. - The possibility of eliminating some symbols from password. Securing the informations: - Each message or file can be encrypted with its own unique key, which can be set as normal or very important. - The procedure for encryption / decryption is very simple. - Protect personal information such as account numbers or other secret messages in a safe manner by encryption with very strong passwords, which otherwise could not be memorized. - Uniquely associated between a record from the database and encrypted message or file. Securing the communications : - Communications are secured "end-to-end", so the transmission can be made on the insecure channels. - Each message or file for communication is encrypted with unique key and signed to ensure confidentiality and authenticity. - Encryption key is unique to each partner and for each transmission in part. More : - Auto-close to protect the app from prying eyes. - Backup, restore and sync to keep data safe in case your device is stolen. - Extra security (by confirmation password) for certain passwords, messages and files encrypted. - Right-to-Left Language Support - Internet connection is not required.
PEM Companion Related Software