Using Encryption To Protect Data; About The Symantec Cryptographic Module - Symantec PCANYWHERE - V12.5 User Manual

Hide thumbs Also See for PCANYWHERE - V12.5:
Table of Contents

Advertisement

218
Securing your computer and sessions

Using encryption to protect data

Using encryption to protect data

About the Symantec Cryptographic Module

you should ensure that you allow remote users sufficient time to perform their
tasks.
See
"Setting time limits for callers"
To set inactivity time limits for sessions
1
In the pcAnywhere window, in Advanced View, on the left navigation bar,
click Hosts.
2
In the right pane, under Hosts, right-click the connection item that you want
to configure, and then click Properties.
3
In the Host Properties window, on the Security Options tab, under Session
Options, check Disconnect if inactive.
4
Select the time-out period.
5
Click OK.
Encryption is a method of encoding or scrambling data to prevent unauthorized
users from reading or tampering with the data. Modern methods of computer
cryptography use complex mathematical algorithms to encrypt and decrypt data.
Symantec pcAnywhere uses a standard combination of public-key cryptography
and symmetric encryption algorithms to ensure that the data you send cannot be
read or altered by unauthorized users while in transit.
The Symantec Cryptographic Module that is included in Symantec pcAnywhere
contains algorithms that provide AES encryption at varying key lengths. The
Symantec Cryptographic Module has received Federal Information Processing
Standards (FIPS) 140-2 certification.
The FIPS 140-2 Security Requirements for Cryptographic Modules is a set of
standards developed by the National Institute of Standards and Technology (NIST).
The FIPS 140-2 standards apply to federal agencies that use cryptographic-based
security systems to protect sensitive but unclassified information in computer
and telecommunication systems. This security technology is mandated for many
government and financial instructions in the United States and Canada.
For more information about the FIPS 140-2 requirements or the validation process,
visit the Web site for the National Institute of Standards and Technology at the
following URL:
http://csrc.nist.gov/cryptval/140-2.htm
on page 214.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pcanywhere 12.5

Table of Contents