Eracom Technologies Innovates the .pac File Format To Secure File Transfer And Storage On Unprotected Mediums

Krefeld, Germany, November 2, 2004 – Eracom Technologies, a leading developer and global supplier of cryptographic technologies, today announced the release of ProtectPack, utilizing the new .pac file format. This innovative application delivers data encryption and compression meeting the increasing need to protect the transfer and storage of electronic documents on unprotected, insecure mediums.

Many organizations today see an increasing number of their workers using unprotected mediums and channels, such as mobile devices and email, to carry out their daily duties and share information with colleagues and business partners. However the resultant productivity gains are rapidly diminished due to the heightened security risks due to the vulnerabilities of insecure mediums, and the extreme usability constraints employed by many solutions.

ProtectPack delivers the solution to exactly both of these security and usability problems.

ProtectPack heralds the latest compressed encryption format, the .pac file, to enable encrypted data to be securely stored and transferred beyond the perimeter of an organization?s protected LAN (Local Area Network). The .pac file is secured by the tried, tested and proven AES (Advanced Encryption Standard) 256 bit encryption, one of the strongest algorithm-based encryption standards available, estimated to take 149 trillion (thousand-billion) years to crack.

ProtectPack delivers unparalleled levels of usability with virtually no learning curve and training required. Operating seamlessly within the Microsoft Windows environment, electronic documents can be easily compressed and encrypted into “Packed” (.pac) files by right clicking on the actual file, or folder of files, and selecting the ?Pack File? function within the standard Windows Explorer Context Menu. Decrypting a packed file is as easy as double clicking on the specific file icon.

Many current solutions on the market present significant challenge to users when attempting to transfer secure, encrypted electronic documents to authorized recipients via unprotected mediums (such as email, floppy disk, CD and removable drives etc). Recipients are often required to have the same encryption application on their PC or mobile device to decrypt and view the file. “One of the most convenient benefits of ProtectPack is the “Self-Extracting” file option, enabling a transfer recipient without ProtectPack installed on their PC to gain access to packed (.pac) documents” states Bernhard van der Feen, Product Manager – Privacy of Information Products for Eracom Technologies. “This Self-Extracting attachment includes a compressed launch program that only requires the recipient to enter the correct pass-phrase to unlock the encryption. This ensures files can be securely and seamlessly transferred to, and accessed by, authorized recipients; providing enhanced usability and peace of mind”.

“ProtectPack completes Eracom Technologies “Privacy of Information” product portfolio which secures sensitive data on mobile devices and on the network” explains Ansgar Dodt, COO EMEA of Eracom Technologies. “Incorporating Eracom Technologies 25 years of continual pioneering excellence in both cryptographic HSM and Privacy of Information software solutions, enables us to deliver leading edge data security, usability and manageability in line with enterprise and government needs. Through listening to the requirements of our customers and the general market, we realized that once data left the security of the enterprise environment, a viable solution was urgently required to properly manage such risk. ProtectPack was thus developed to respond to enterprise and government needs for unparalleled levels of secure data transfer and storage on unprotected mediums and channels”.

About Eracom Technologies

Celebrating 25 years (1979-2004) of excellence in cryptography, Eracom Technologies is a leading developer and global supplier of cryptographic hardware and software products. As a true pioneer in the IT security industry, Eracom offers proven cryptographic security solutions to a wide range of industries including banking, finance, government and technology sectors. In the last two decades alone, Eracom has successfully developed and deployed several generations of Hardware Security Modules (HSMs) to the market as well as a range of advanced cryptographic APIs and privacy of information products.

Eracom provides 24×7 worldwide customer support with guaranteed response times as well as access to free updates and documentation via the Eracom Website. Eracom is represented by a worldwide network of wholly owned subsidiaries and distribution channels with offices in 11 countries.

Eracom is proud to have served and supported the ever increasing and most stringent IT security needs with its Electronic Transaction Security and Privacy of Information portfolios. Together with its worldwide partners, Eracom is here to protect the future. For more information about Eracom Technologies, visit our web site at

About ProtectPack

ProtectPack enables secure, encrypted transfer and storage of confidential data files on unprotected mediums (both portable and network) that are difficult to defend by conventional network security mechanisms. The .pac file, developed by Eracom Technologies, also compresses data before encryption to enable maximum storage and data transfer efficiency.

Usability is one of the greatest benefits delivered by ProtectPack. Virtually no learning curve and training is required, thereby ensuring rapid uptake by all users enterprise wide, at all levels of computer experience.

ProtectPack delivers the freedom to securely share encrypted electronic files with any authorized recipient. ProtectPack is not required to be installed on the recipient?s device to decrypt the data, only the correct pass-phrase is required.

ProtectPack also enables streamlined administration management. Rapid and convenient deployment via Microsoft Installer, plus speedy and convenient mass deployment via the silent batch file installation function; requires no additional learning curve for administrators familiar with the Windows environment.

Don't miss