TrustPort
Encyclopedia
TrustPort a.s. is a security software
Security software
Security software is a generic term referring to any computer program or library whose purpose is to secure a computer system or computer network. Types of security software include:* Antivirus software* Anti keylogger* Cryptographic software...

 company, headquartered in Brno
Brno
Brno by population and area is the second largest city in the Czech Republic, the largest Moravian city, and the historical capital city of the Margraviate of Moravia. Brno is the administrative centre of the South Moravian Region where it forms a separate district Brno-City District...

, Czech Republic
Czech Republic
The Czech Republic is a landlocked country in Central Europe. The country is bordered by Poland to the northeast, Slovakia to the east, Austria to the south, and Germany to the west and northwest....

. Its products focus on three main areas of computer and data protection. The first area is the protection against viruses
Computer virus
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability...

, spyware
Spyware
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's...

, and malware
Malware
Malware, short for malicious software, consists of programming that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior...

 in general. TrustPort implements its own antivirus
Antivirus software
Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, trojan horses, spyware and adware...

 technology, using multiple scanning engines, licensed from several antivirus
Antivirus software
Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, trojan horses, spyware and adware...

 producers. The second area is filtering of unwanted data, like electronic mail spam
E-mail spam
Email spam, also known as junk email or unsolicited bulk email , is a subset of spam that involves nearly identical messages sent to numerous recipients by email. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. One subset of UBE is UCE...

 or objectionable website content. TrustPort develops filtering technologies, based on both simple rules and heuristic analysis. The third area is the confidentiality and authenticity of electronic data. Both symmetric and asymmetric cryptography are being used in TrustPort technology for data encryption
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...

 and electronic signing
Electronic signature
An electronic signature, or e-signature, is any electronic means that indicates either that a person adopts the contents of an electronic message, or more broadly that the person who claims to have written a message is the one who wrote it . By comparison, a signature is a stylized script...

. TrustPort solutions range from the protection of individual computers to the protection of whole networks.

Before company foundation

TrustPort was preceded by the AEC (originally an abbreviation of Association for Electronics and Computers), founded in 1991. AEC was selling software and providing services in the field of data security. Already in 1993, the company started to develop its own security software, in addition to products from other manufacturers. Original AEC software products from the 1990s
1990s
File:1990s decade montage.png|From left, clockwise: The Hubble Space Telescope floats in space after it was taken up in 1990; American F-16s and F-15s fly over burning oil fields and the USA Lexie in Operation Desert Storm, also known as the 1991 Gulf War; The signing of the Oslo Accords on...

 were generally branded as IronWare. They included for example IronWall for file encryption, IronBridge for network communications protection, IronMail for electronic mail encryption, and IronFolder for automated encryption and decryption in specified folders. Even these early products indicated some future directions of the software sold under the TrustPort brand.

The software gradually became known as IronWare Security Suite. In September 2000, based on previous contract between AEC and Norman ASA
Norman ASA
Norman ASA founded in on October 1, 1984, is active within the field of data security, with products for antivirus , personal firewall, antispam, encryption, antispyware, and parental control...

, the IronWare Security Suite product rights and development team passed into the onwnership of Norman, and the software was renamed to Norman Security Suite. AEC continued to sell the software as a business partner
Business partner
Business partner is a term used to denote a commercial entity with which another commercial entity has some form of alliance. This relationship may be a highly contractual, exclusive bond in which both entities commit not to ally with third parties...

 of Norman. In March 2002, AEC once again started to promote software of its own production, when it introduced DataShredder, TrustMail, and TrustPort Encryption at the Cebit
CeBIT
CeBIT is the world's largest and most international computer expo. CeBIT is held each year on the world's largest fairground in Hanover, Germany, and is a barometer of the state of the art in information technology...

 computer expo
Computer expo
A computer expo or computer show is a trade fair or exposition for computers and electronics. Expos usually include company or organization booths where products and technologies are demonstrated; talks and lectures; and general mixing of people with common interests.- Notable Computer...

. DataShredder was designed for irreversible deletion of sensitive data, TrustMail for encryption and signing of data, TrustPort Encryption for file encryption, applicable both with personal computers, and with mobile devices.

In January 2003, AEC launched its TrustPort Certification Authority, the first certification authority
Certificate authority
In cryptography, a certificate authority, or certification authority, is an entity that issues digital certificates. The digital certificate certifies the ownership of a public key by the named subject of the certificate...

 in the Czech Republic, which supported digital timestamping
Trusted timestamping
Trusted timestamping is the process of securelykeeping track of the creation and modification time of a document. Securityhere means that no one — not even the owner of the document — should be able to change it once it has been recorded provided that the timestamper's integrity is never...

. In April 2003, a second version of TrustMail was released, implementing the timestamping technology. In 2003, a comprehensive security solution called TrustPort Phoenix Rebel started to take shape, piece by piece. The idea was to build unified software solution, integrating different elements, essential for computer security, like antivirus
Antivirus software
Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, trojan horses, spyware and adware...

, antispam, firewall
Firewall (computing)
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

, or encryption
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...

; at the same time, both personal computer
Personal computer
A personal computer is any general-purpose computer whose size, capabilities, and original sales price make it useful for individuals, and which is intended to be operated directly by an end-user with no intervening computer operator...

s and servers were to be protected.

By 2005, all building blocks of TrustPort Phoenix Rebel were completed. The whole solution was originally divided into three main products, TrustPort Phoenix Rebel Workstation, TrustPort Phoenix Rebel Servers, consisting of gateway antivirus, gateway antispam, and network firewall
Firewall (computing)
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

, and finally TrustPort Phoenix Rebel Management. The first product gradually became known as TrustPort Workstation, while the second product as TrustPort Internet Gateway. In May 2007, AEC introduced TrustPort WebFilter, a gateway product for blocking of unwanted web content.

Since company foundation

In November 2007, an acquisition agreement between AEC and Cleverlance was signed. Cleverlance as the new owner of AEC made a strategic decision to form a standalone company out of the AEC development department. In March 2008, the new company was officially entered into the trade register of Czech Republic, under the name of TrustPort, with Jiří Mrnuštík as the chief executive officer
Chief executive officer
A chief executive officer , managing director , Executive Director for non-profit organizations, or chief executive is the highest-ranking corporate officer or administrator in charge of total management of an organization...

. AEC continued to sell TrustPort software as a TrustPort reseller
Reseller
A reseller is a company or individual that purchases goods or services with the intention of reselling them rather than consuming or using them. This is usually done for profit...

. Following TrustPort detachment, both AEC and TrustPort moved to new office premises in Spielberk Office Centre in June 2008.

In April 2008, two major changes were made in TrustPort product portfolio. TrustPort Workstation was renamed to TrustPort PC Security, in order to align the product name with the products of competing companies. At the same time, TrustPort Antivirus was established as a standalone product for those customers, who do not seek a comprehensive security suite, but rather an essential antimalware protection.

In November 2008, the innovated basic product line, consisting of TrustPort Antivirus 2009 and TrustPort PC Security 2009, was introduced to the market. It featured upgraded graphical user interface
Graphical user interface
In computing, a graphical user interface is a type of user interface that allows users to interact with electronic devices with images rather than text commands. GUIs can be used in computers, hand-held devices such as MP3 players, portable media players or gaming devices, household appliances and...

, parental lock technology
Parental controls
Parental controls are features which may be included in digital television services, computer and video games, mobile phones and computer software...

 and several other innovations. January 2009 marked the launch of TrustPort Antivirus USB Edition, soon to be renamed to TrustPort USB Antivirus, a piece of antivirus software designed specifically for the protection of flash drives
USB flash drive
A flash drive is a data storage device that consists of flash memory with an integrated Universal Serial Bus interface. flash drives are typically removable and rewritable, and physically much smaller than a floppy disk. Most weigh less than 30 g...

.

There was a change in the company management in February 2009. Vladislav Němec was appointed the new chief executive officer of TrustPort. Throughout the year, business partnerships were established or reinforced with several important distributors around the globe, for example in Britain
United Kingdom
The United Kingdom of Great Britain and Northern IrelandIn the United Kingdom and Dependencies, other languages have been officially recognised as legitimate autochthonous languages under the European Charter for Regional or Minority Languages...

, Canada
Canada
Canada is a North American country consisting of ten provinces and three territories. Located in the northern part of the continent, it extends from the Atlantic Ocean in the east to the Pacific Ocean in the west, and northward into the Arctic Ocean...

, Italy
Italy
Italy , officially the Italian Republic languages]] under the European Charter for Regional or Minority Languages. In each of these, Italy's official name is as follows:;;;;;;;;), is a unitary parliamentary republic in South-Central Europe. To the north it borders France, Switzerland, Austria and...

, India
India
India , officially the Republic of India , is a country in South Asia. It is the seventh-largest country by geographical area, the second-most populous country with over 1.2 billion people, and the most populous democracy in the world...

, Mexico
Mexico
The United Mexican States , commonly known as Mexico , is a federal constitutional republic in North America. It is bordered on the north by the United States; on the south and west by the Pacific Ocean; on the southeast by Guatemala, Belize, and the Caribbean Sea; and on the east by the Gulf of...

, Spain
Spain
Spain , officially the Kingdom of Spain languages]] under the European Charter for Regional or Minority Languages. In each of these, Spain's official name is as follows:;;;;;;), is a country and member state of the European Union located in southwestern Europe on the Iberian Peninsula...

 and France
France
The French Republic , The French Republic , The French Republic , (commonly known as France , is a unitary semi-presidential republic in Western Europe with several overseas territories and islands located on other continents and in the Indian, Pacific, and Atlantic oceans. Metropolitan France...

. In November 2009, TrustPort Antivirus 2010 and TrustPort PC Security 2010 were released for sale. Among the new features, automated software upgrade
Upgrade
The term upgrade refers to the replacement of a product with a newer version of the same product. It is most often used in computing and consumer electronics, generally meaning a replacement of hardware, software or firmware with a newer or better version, in order to bring the system up to date...

s, email client plugins, and language selection at any time were some of the most notable. In April 2010, TrustPort eSign Pro extended the current product portfolio.

In order to meet the different needs of different customer segments, the company reshaped its portfolio in September 2010. For home users and small offices, three instead of two alternative products were introduced, starting with TrustPort Antivirus 2011, followed by TrustPort Internet Security 2011 and TrustPort Total Protection 2011. For medium and large businesses, a comprehensive solution TrustPort Security Elements was put on the market, with four different protection levels available. TrustPort Security Elements was designed as a software bundle that would protect various elements of a heterogenous network.

Home and small office

TrustPort Antivirus
Compact security software for personal computers, providing essential protection against viruses and spyware.


TrustPort Internet Security
Comprehensive security suite for personal computers, consisting of antivirus, antispyware, antispam, personal firewall, and parental lock.


TrustPort Total Protection
Extended security suite for personal computers, including antivirus, antispyware, antispam, personal firewall, parental lock, encryption and shredding tools.


TrustPort USB Antivirus
Portable security software for flash drives, including antivirus, antispyware, encryption and shredding tools.

Medium and large business

TrustPort Security Elements
Security software bundle for computer protection in corporate networks. It comes in four levels, depending on the extent of protection.


TrustPort Small Business Server
Security software bundle for the protection of endpoint computers, file servers and the whole network
Intranet
An intranet is a computer network that uses Internet Protocol technology to securely share any part of an organization's information or network operating system within that organization. The term is used in contrast to internet, a network between organizations, and instead refers to a network...

.


TrustPort Net Gateway
Modular security software for the protection of private computer networks
Intranet
An intranet is a computer network that uses Internet Protocol technology to securely share any part of an organization's information or network operating system within that organization. The term is used in contrast to internet, a network between organizations, and instead refers to a network...

, consisting of email antivirus, antispam, web antivirus, web filter, and firewall.


TrustPort WebFilter
Security software for corporate web traffic
Web traffic
Web traffic is the amount of data sent and received by visitors to a web site. It is a large portion of Internet traffic. This is determined by the number of visitors and the number of pages they visit...

 control, which enables monitoring and blocking of unwanted web content.


TrustPort Antivirus for Servers
Server variant of TrustPort Antivirus, implementing multiple data threads scanning.


TrustPort eSign Pro
Security software for personal computers, consisting of tools for document encryption, decryption, electronic signing and timestamping.

Other solutions

TrustPort Certification Authority
Server software for issuing, verification, and revocation of digital certificates
Public key certificate
In cryptography, a public key certificate is an electronic document which uses a digital signature to bind a public key with an identity — information such as the name of a person or an organization, their address, and so forth...

.


TrustPort Timestamp Authority
Server software for issuing of timestamps
Trusted timestamping
Trusted timestamping is the process of securelykeeping track of the creation and modification time of a document. Securityhere means that no one — not even the owner of the document — should be able to change it once it has been recorded provided that the timestamper's integrity is never...

, confirming the existence of a document at a given time.


TrustPort PKI SDK
Set of tools for creating and modifying applications, using original public key infrastructure
Public key infrastructure
Public Key Infrastructure is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate...

.

Independent tests

TrustPort products have been regularly tested and awarded by independent testing labs. In October 2006, TrustPort Antivirus was tested by Virus Bulletin
Virus Bulletin
Virus Bulletin is a magazine about the prevention, detection and removal of malware and spam. It regularly features analyses of the latest virus threats, articles exploring new developments in the fight against viruses, interviews with anti-virus experts, and evaluations of current anti-malware...

, and obtained VB100 award for the first time. In the same month, testing by AV-Comparatives was performed, resulting in the first AV-Comparatives Advanced+ award for TrustPort Antivirus. In February 2009, TrustPort PC Security was tested by PC Security Labs, and was awarded PC Security Labs Excellent for the first time. In January 2010, West Coast Labs tested TrustPort Antivirus. As a result, the product obtained Checkmark award in two categories.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK