IF YOUR FINANCIAL
INFORMATION IS SENSITIVE, DON'T WRITE IT DOWN, TALLY Vault IT.
The Security of
Data, Financial or otherwise, has always been a matter of concern.
Most business depend
on the confidentiality of information, and
go to extreme lengths to keep information secret.
The advent of
computers degraded this ability considerably.
Suddenly, physical protection
of books was no longer possible,
and virtually anyone who had
access to the computer, had access to the
information.
This has hampered
the usage of computers.
The fear, in
fact, is real. The paranoid are not the only ones afraid of information
leakage.
Encryption of
Data on a
computer offered the
first solution. Encryption means
converting the normally recognisable information into garbage, which
can only be reconverted by authorised
persons. An authorised person
would be checked against a Password.
The pitfalls are, the most Encryption methods
are easily deciphered That is to say, a reasonable amount of time and
effort by a Computer Programmer, could
get the original information
back without the password. To
counter this problem, advanced studies have been
made across the
world, to come up with techniques
of encryption, which CANNOT be broken using mathematical tools. One such
method has been called the
"Data Encryption Standard", and the
system has been published by the
"American National Standards Institute" or ANSI. This is the
accepted standard of encryption
used even in
such highly sensitive area
like Banking and Defence.
Despite this
apparent Final Solution to the problem
of Encryption, there remained
the fear of Password Detection. Most software
programs which offer
encryption, do so with the "stored password" concept. This means, that
the original password is kept in some
form (internally encrypted or
not), which it uses to verify the
genuineness of the authorised person.
Once again, it
would become possible
for a competent programmer, to gain access into the
system by discovering the password.
Lastly the
problem of latent storage remained. Most computer users are aware, that simple deletion of a file from the disk,
does not remove the information on it. Thus, encryption
mechanisms which dealt with un-encrypted
data, would leave the original and intact information in some form or the other. Apart from this, if a
power-failure occurred while processing
the original information,
the facility would
be useless, as on power-on, the un-encrypted information
would be found on the hard disk.
This brings us to
TALLY. In keeping with its basic philosophy, that a facility made
available to a user is to be complete in every
respect, TALLY evolved
the concept of TALLY Vault. At its very
basic, TALLY Vault guarantees,
that under no Circumstances, the original information is available in any form. The technique could
be likened to
"encryption-decryption-on-the-fly", and the decrypted form of data is never
stored in the system. Apart from this, it uses
the "non- stored password" mechanism. This implies, that
the original password provided by the user is not retained on the system.
This of
course, raises the
question, that if the password is not stored, then how can any Software check whether the person giving the
password is genuine or not? TALLY uses highly advanced mechanisms to
validate a new user
WITHOUT ANY PRIOR
KNOWLEDGE OR THE ORIGINAL PASSWORD.
The combination of these facilities means, that
TALLY Vault becomes one of the most
SECURE MEANS OF INFORMATION STORAGE. Indeed, it can be safely said, that "IF YOUR FINANCIAL
INFORMATION IS SENSITIVE, DON'T WRITE IT DOWN,
TALLY Vault IT".