IF YOUR FINANCIAL INFORMATION IS SENSITIVE, DON'T WRITE IT DOWN, TALLY Vault IT.
The Security of Data, Financial or otherwise, has always been a matter of concern. Most business depend on the confidentiality of information, and go to extreme lengths to keep information secret.
The advent of computers degraded this ability considerably. Suddenly, physical protection of books was no longer possible, and virtually anyone who had access to the computer, had access to the information.
This has hampered the usage of computers.
The fear, in fact, is real. The paranoid are not the only ones afraid of information leakage.
Encryption of Data on a computer offered the first solution. Encryption means converting the normally recognisable information into garbage, which can only be reconverted by authorised persons. An authorised person would be checked against a Password.
The pitfalls are, the most Encryption methods are easily deciphered That is to say, a reasonable amount of time and effort by a Computer Programmer, could get the original information back without the password. To counter this problem, advanced studies have been made across the world, to come up with techniques of encryption, which CANNOT be broken using mathematical tools. One such method has been called the "Data Encryption Standard", and the system has been published by the "American National Standards Institute" or ANSI. This is the accepted standard of encryption used even in such highly sensitive area like Banking and Defence.
Despite this apparent Final Solution to the problem of Encryption, there remained the fear of Password Detection. Most software programs which offer encryption, do so with the "stored password" concept. This means, that the original password is kept in some form (internally encrypted or not), which it uses to verify the genuineness of the authorised person. Once again, it would become possible for a competent programmer, to gain access into the system by discovering the password.
Lastly the problem of latent storage remained. Most computer users are aware, that simple deletion of a file from the disk, does not remove the information on it. Thus, encryption mechanisms which dealt with un-encrypted data, would leave the original and intact information in some form or the other. Apart from this, if a power-failure occurred while processing the original information, the facility would be useless, as on power-on, the un-encrypted information would be found on the hard disk.
This brings us to TALLY. In keeping with its basic philosophy, that a facility made available to a user is to be complete in every respect, TALLY evolved the concept of TALLY Vault. At its very basic, TALLY Vault guarantees, that under no Circumstances, the original information is available in any form. The technique could be likened to "encryption-decryption-on-the-fly", and the decrypted form of data is never stored in the system. Apart from this, it uses the "non- stored password" mechanism. This implies, that the original password provided by the user is not retained on the system. This of course, raises the question, that if the password is not stored, then how can any Software check whether the person giving the password is genuine or not? TALLY uses highly advanced mechanisms to validate a new user
WITHOUT ANY PRIOR KNOWLEDGE OR THE ORIGINAL PASSWORD.
The combination of these facilities means, that TALLY Vault becomes one of the most SECURE MEANS OF INFORMATION STORAGE. Indeed, it can be safely said, that "IF YOUR FINANCIAL INFORMATION IS SENSITIVE, DON'T WRITE IT DOWN, TALLY Vault IT".