File Protect System
File Protect System
Rating (1)
Reviews: 3
Category: Security
File Protect System
File Protect System
File Protect System
File Protect System
File Protect System
File Protect System
File Protect System
File Protect System
File Protect System
File Protect System



File Protect System (FPS) is a software application for protection of personal data and critical information.
This protection is performed by reliable strong encryption of files and folders.

The capabilities of the software are compliant with Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation - GDPR).

The application can be used as a stand-alone solution or as part of the enterprise cyber protection system (system BS-1421R).


Working with FPS does not require special knowledge. The interface is intuitive. Working with the application is very similar to that of File Explorer. Users can choose between a large number of encryption algorithms. Settings can be saved, which allows customization of the system.


  • Free Edition - Limited Edition version. Used for educational.
  • Light Edition - Personalized, accountant and law firms.
  • Standard Edition - Designed for small and medium-sized businesses.
  • Semi-Professional Edition - Used by hotels, development units and software companies.
  • Professional Edition - Focused on industrial processes and large data sets.
  • Enterprise Edition - Used by industry and bank structures and corporations.


The application includes the following standard encryption algorithms:

Advanced Encryption Standard (block size of 128 bits, key lengths: 128, 192 and 256 bits)
Haval (256 bit, 5 passes)
CAST-128 (CAST-5)
CAST-256 (CAST-6)
Information Concealment Engine (ICE)
Information Concealment Engine 2 (ICE-2)
ICE Encrypt
MISTY-1 (Mitsubishi Improved Security Technology)
Ron’s Code 2 or Rivest’s Cipher 2 (RC-2)
Ron’s Code 4 or Rivest’s Cipher 4 (RC-4)
Ron’s Code 5 or Rivest’s Cipher 5 (RC-5)
Ron’s Code 6 or Rivest’s Cipher 6 (RC-6)
Tiny Encryption Algorithm (TEA)

Affordable hash functions:

Secure Hash Algorithm 1 [SHA-1]
Haval [256 Bit, 5 passes]
Message Digest 5 [MD-5]
Message Digest 4 [MD-4]
SHA-256 (SHA-2 family)
SHA-384 (SHA-2 family)
SHA-512 (SHA-2 family)


ISO 10116: Information Processing — Modes of Operation for an n-bit block cipher algorithm.
ISO 9797: Data cryptographic techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm.
ISO 9798-2: Information technology — Security technicues — Entity authentication mechanisms — Part 2: Entity authentication using symmetric techniques.
ISO 10118-2: Information technology — Security technicues — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm.
ISO 11770-2: Information technology — Security technicues — Key management — Part 2: Key management mechanisms using symmetric techniques.


Encryption: Data Encryption Standard (DES) - FIPS 46-3
Encryption: DES Modes of Operation - FIPS 81
Encryption: Advanced Encryption Standard (AES) - FIPS 197 (with keys sizes of 128 and 256 bits)
Hashing: Secure Hash Algorithm - FIPS 180-2 (using SHA-256 and SHA-384)
Guidelines on Electronic Mail Security - Special Publication 800-45 Version 2

  • Strong encryption files and folders.
  • Secure encryption of all file formats.
  • High speed encrypt processing.
  • Reliable protection of critical information.
  • Generate encrypted archives (each file can be encrypted with a different cipher).
  • Ability to pre-check the selected cipher.
  • Real-time process control.
  • А tactical personal cyberwar system.
  • Be Mail - Encrypt message system.
Release date: 2018-09-26
Last update: 2022-03-11