PEM Companion 2.0
What is different:
- The passwords are not archived anywhere.
- Every personal message and file is encrypted with its own key. These keys are also not archived.
- Every message and file used for communications is encrypted with a one-time key.
- The passwords are not archived anywhere.
- Every personal message and file is encrypted with its own key. These keys are also not archived.
- Every message and file used for communications is encrypted with a one-time key.
Last update
15 Jun. 2015
Licence
Free
OS Support
Windows
Downloads
Total: 359 | Last week: 2
Ranking
#239 in
Encryption software
Publisher
3q Elsonet
Screenshots of PEM Companion
PEM Companion Publisher's Description
Other Functions
Password management :
- Users can generate passwords creating and using their desired alphabet .
- Creates strong and unique non-guessable passwords.
- Passwords can vary between 4 and 32 characters in length.
- It remains the user’s choice whether the passwords contain digits, lowercase/uppercase letters and/or symbols.
- It is user-friendly. It creates new passwords and facilitates their replacement on any given website by "keeping" the previous passwords.
- Protects personal passwords WITHOUT STORING THEM (passwords are never saved/archived anywhere) in the software, on the device or in a cloud. Therefore, should your device get stolen, the information remains protected.
- Offers the possibility to eliminate some symbols from the password.
Securing information:
- Each message or file can be encrypted with its own, unique key. Moreover, this key can be set as ‘normal’ or ‘very important’.
- PEM makes encrypting/decrypting an easy process.
- Personal information, (e.g. account numbers and secret messages), is safely protected through encryption via exceedingly strong passwords, which otherwise could not be memorized.
- Unique association between a record from the database and encrypted message or file.
Securing communications :
- Communications are secured “end-to-end”, thus transmission can be made even on insecure channels.
- Each message or file used for communication is encrypted with a unique key and signed to ensure confidentiality and authenticity.
- Every encryption key is unique to each partner and for each transmission in part.
More :
- Auto-close to protect the app from prying eyes.
- Backup, restore and sync to keep data safe in case your device gets stolen.
- Extra security (by confirmation password) for certain passwords, messages and files encrypted.
- Right-to-Left Language Support
- Internet connection is not required.
- and many more ...
Password management :
- Users can generate passwords creating and using their desired alphabet .
- Creates strong and unique non-guessable passwords.
- Passwords can vary between 4 and 32 characters in length.
- It remains the user’s choice whether the passwords contain digits, lowercase/uppercase letters and/or symbols.
- It is user-friendly. It creates new passwords and facilitates their replacement on any given website by "keeping" the previous passwords.
- Protects personal passwords WITHOUT STORING THEM (passwords are never saved/archived anywhere) in the software, on the device or in a cloud. Therefore, should your device get stolen, the information remains protected.
- Offers the possibility to eliminate some symbols from the password.
Securing information:
- Each message or file can be encrypted with its own, unique key. Moreover, this key can be set as ‘normal’ or ‘very important’.
- PEM makes encrypting/decrypting an easy process.
- Personal information, (e.g. account numbers and secret messages), is safely protected through encryption via exceedingly strong passwords, which otherwise could not be memorized.
- Unique association between a record from the database and encrypted message or file.
Securing communications :
- Communications are secured “end-to-end”, thus transmission can be made even on insecure channels.
- Each message or file used for communication is encrypted with a unique key and signed to ensure confidentiality and authenticity.
- Every encryption key is unique to each partner and for each transmission in part.
More :
- Auto-close to protect the app from prying eyes.
- Backup, restore and sync to keep data safe in case your device gets stolen.
- Extra security (by confirmation password) for certain passwords, messages and files encrypted.
- Right-to-Left Language Support
- Internet connection is not required.
- and many more ...
What's New in Version 2.0 of PEM Companion
New in PEM Companion version 2.0
1) The Master Password and HighSecurity Password can be modified in the free version
2) In order to modify and record new passwords a key must be purchased from inside the PEM app (mobile version)
3) Random passwords can be generated faster without the need to open the app (via the introduction of the Master Password)
1) The Master Password and HighSecurity Password can be modified in the free version
2) In order to modify and record new passwords a key must be purchased from inside the PEM app (mobile version)
3) Random passwords can be generated faster without the need to open the app (via the introduction of the Master Password)
4) Installing process of "Unlimited Strength Jurisdiction Policy" is made easier
Look for Similar Items by Category
Feedback
- If you need help or have a question, contact us
- Would you like to update this product info?
- Is there any feedback you would like to provide? Click here
Beta and Old versions
Popular Downloads
- Kundli 4.5
- Macromedia Flash 8 8.0
- Cool Edit Pro 2.1.3097.0
- Hill Climb Racing 1.0
- Cheat Engine 6.8.1
- Grand Theft Auto: Vice City 1.0
- C-Free 5.0
- Windows XP Service Pack 3 Build...
- Iggle Pop 1.0
- Grand Auto Adventure 1.0
- Ulead Video Studio Plus 11
- Zuma Deluxe 1.0
- Netcut 2.1.4
- AtomTime Pro 3.1d
- Tom VPN 2.2.8
- Auto-Tune Evo VST 6.0.9.2
- Horizon 2.9.0.0
- Vidnoz AI 1.0.0
- Vector on PC 1.0
- PhotoImpression 6.5