Abylon Logon 12.9 PRV was available as a giveaway on April 16, 2015!
Protect your computer from illegal access with Abylon Logon. All you have to do is to save your Windows login data to a smart card, a removable media (e. g. memory stick) or a CD. From now on you need only this physical key for the login authentication. After the work is done, just pull out the removable disk and your computer will turn off automatically. The program will easily protect your computer against snoopy visitors and data theft.
Windows XP/ Vista/ 7/ 8; USB-token or Smartcard
The encrypted drives can be opened with passwords, chip cards, USB sticks (flashdrives), CD or (PKCS) certificate. Get an access to them like to a normal drive in File Explorer. During every file operation the encryption works transparently on the background. If you lose your notebook, the closed drives will be invisible and protected like a safe.
Can you keep all passwords and access data in your mind? The abylon KEYSAFE is a simple password manager to manage all your secret data. You need only one password or alternatively a USB Stick, CD, chip card or certificate as “keys”. The stored data can simply be pulled with a mouse into the appropriate fields of the Browsers or dialogue (Drag&Drop).
The protection of the computer and stored files against undesirable access is very important. This comprehensive software package offers innovative and professional security and encryption modules for private and business use. Beside the password- or certificate-based encryption you can protect the computer against ineligible access or files removal.
Abylon BACKUP TUBE creates exact copies of all files and directories. The backup or synchronization can be done automatically or manually. Intelligent routines speed up the backup process and reduce the amount of data. Only changed or new files are copied to the backup store.
WLAN-LIVE-SCANNER checks regular intervals of any available wireless network and lists them in a clear tree structure. Network name (SSID), connection status, network type, encryption algorithm and signal strength are displayed as additional information. With one click the connection to the selected network is established, despite the access is free, public or already used.