AES-256 Security: Now Standard in CompanionLink & DejaOffice

Published by
David Z


Whether it’s a company requirement, an industry standard practice, or a personal preference, many users find their wireless sync options limited by the lack of secure solutions available to them. Most cloud-based systems are not an option as user data is stored on an outside server. Even local Wi-Fi can be an issue if the data is not securely transferred.

At CompanionLink, we take data security very seriously. Keeping your data in sync is our end goal, but keeping it safe in the process is extremely important as well. That’s why we’re now using AES-256 Security in the latest versions of CompanionLink and DejaOffice for Android (and iOS soon). So just how secure is AES-256 Security? Let’s take a look.

AES stands for Advanced Encryption Standard, and the number 256 refers to the number of bits in the key size. Bits? Keys? I know, it sounds technical – and it is! If you’d like to read up on all the specifics of AES-256 Security, I’ll refer you to other online sources. With that said, let’s get back to explaining just how safe your data is under this security protocol. I’d like to refer to quote from the Computer Security Division of the National Institute of Standards and Technology stating:

“The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths.”

In a nutshell, the NSA considers AES-256 secure enough to protect TOP SECRET classified information. Data doesn’t get much more secure than that. With AES-256 Security built in, you can rest assured knowing that your data is secure with CompanionLink and DejaOffice!

AES-256 Security: Now Standard in CompanionLink & DejaOffice was last updated March 22nd, 2011 by David Z
AES-256 Security: Now Standard in CompanionLink & DejaOffice was last modified: March 22nd, 2011 by David Z
David Z

Disqus Comments Loading...

Recent Posts

Choosing the Right Outsourcing Partner: A Comprehensive Guide

Be sure to choose a partner with similar values and abilities. With саreful сonsiԁerаtion of…

6 mins ago

How to Ensure Effective Training for Your Remote IT Employees

Effective training for remote IT employees is essential for driving innovation, productivity, and success in…

40 mins ago

Employee Monitoring Software: Boosting Productivity and Compliance

Keeping track of employee activities and ensuring productivity, security, and compliance are paramount. Employee Monitoring…

7 hours ago

Meta Tag Oversights that Killed Our Search Visibility (And the Optimization Strategies that Revived It)

As a seasoned SEO agency, we understand the critical role of diligent website monitoring for…

20 hours ago

Top Features of Board Management Tools That Streamline Operations

Organizations can optimize their governance processes, improve decision-making, and drive organizational success in today's dynamic…

1 day ago

8 Link-Building Mistakes You Should Avoid at All Costs

Link building is a rewarding practice that should be a part of every SEO strategy.…

2 days ago