Disclaimer Downloads Email Examples Information Links Products Program Screens  
What Eureka Is

Eureka Encryption data security software products are unlike any other in the marketplace today.  Our clients enjoy not only great software products, but also free support and cost-efficient data security consulting, which is vital to every business in today's global marketplace.  Protecting your data is not just your concern, it is ours as well.  Whether you represent a corporation, a small business or are an individual, the privacy and security of your data is our business.

Our Eureka products will satisfy the needs of the professional cryptographer and the corporate security officer alike, but are easy to use and straight forward enough for even the most casual user to operate.  The current product line have been over <%= yrstr %> years in development and are fine-tuned, rigorously tested, stable and user friendly collection of applications.

Whether you have a text file, an email message, your own application object code or any other type of computerized data to protect, we have the software and tools you need to safely secure your data.  Discover what our users and clients have discovered - the solution for security on the Internet.

As our systems evolved, three modes of encryption were developed.  All three modes are present in Eureka 5.5.2 and can be utilized concurrently as part of the system.  The first two styles are the one-to-one relationship - the processed file is exactly the same filesize as the original file processed (all other products).  The third style will hide the data by expanding the size of the processed file and embedding the 'good' characters within bogus ones.

Combining all the methods of encryption available to you in Eureka yields an unlimited number of encryption techniques (enhanced by wizards), thus making the attack against your data impossible.

In addition, all of the sensitive parameter files used by Eureka can be copied to the backup medium of your choice, then securely deleted.  This leaves the encrypted data files on your PC's hard drive (or corporate disk storage devices) useless in case of theft or any other type of unauthorized access.  Of course you can easily restore the system files needed by Eureka to perform its "magic" from your backup.  And it's Network, Intranet and Internet friendly!

Eureka products contain no backdoors and none of the data contained in the encrypted files serve as an aid to deciphering the original contents.   Not one of our clients over the past <%= yrstr %> years have ever reported the data secured by Eureka to have been compromised.  None of the applications contain adware, spyware, viruses, nor any other type of information gathering or malicious intent.

See the Products area for some of our other related software products and services available today.





Data Security Solutions, Inc.

Privacy Statement

Copyright © 1994 - 2009 Data Security Solutions, Inc. All rights reserved.
All registered marks and trademarks mentioned in this site are the property of their owners.