PEM for mobile works on phones and tablets with Android - versions 2.3 (Gingerbread) to 5.1 (Lollipop).
Current version of PEM is 2.0.1 and can be downloaded from
Google Play or from Samsung GALAXY Apps (only from and for Samsung devices)
Solves the problem of password management, securing data and information as well as communications.
Password management: generates, stores, deletes, modifies and retains all previous versions of the passwords
Securing information: encrypts private messages and files
Securing communications: encrypts messages and files when communicating with partners
Permanent deletion of certain files on disk
Self-destruction of ALL DATA (of this application) in case of hacker attempts to guess your master password.
Users can generate passwords creating and using their desired alphabet
Creates strong and unique, non-guessable passwords.
Passwords can vary between 4 and 32 characters in length.
It remains the user’s choice whether the passwords contain digits, lowercase/uppercase letters and/or symbols
It is user-friendly. It creates new passwords and facilitates their replacement on any given website by “keeping” the previous passwords
Protects personal passwords WITHOUT STORING THEM (passwords are never saved/archived anywhere) in the software, on the device or in a cloud. Therefore, should your device get stolen, the information remains protected.
Offers the possibility to eliminate some symbols from the password.
Each message or file can be encrypted with its own, unique key. Moreover, this key can be set as ‘normal’ or ‘very important’.
PEM makes encrypting/decrypting an easy process.
Personal information, (e.g. account numbers and secret messages), is safely protected through encryption via exceedingly strong passwords, which otherwise could not be memorized.
Unique association between a record from the database and encrypted message or file.
Communications are secured “end-to-end”, thus transmission can be made even on insecure channels.
Each message or file used for communication is encrypted with a unique key and signed to ensure confidentiality and authenticity.
Every encryption key is unique to each partner and for each transmission in part.
Auto-close to protect the app from prying eyes.
Backup, restore and sync to keep data safe in case your device gets stolen.
Extra security (by confirmation password) for certain passwords, messages and files encrypted.
Right-to-Left Language Support
Internet connection is not required. This application can also be used in areas without network coverage.
Information can be easily and quickly found in the database due to the user’s ability to organize it according to his/her requirements.
PEM for mobile works on Android - versions 2.3 (Gingerbread) to 5.1 (Lollipop).
PEM for Desktop works on Windows (XP, 7, 8, 10) and Linux.
PEM for Desktop does not require installation; Works on USB flash drive or hard disk.
Optimized view for handset, tablet and monitor
Android- Windows-Linux compatibility for database, messages and files encrypted for private use as well as messages and files encrypted for communication.
The application is highly customizable, users can set: password length, learning mode, closing and reset time, validity period of the password, font size for certain fields, etc.
Intuitive interface thus the application is easy to use.
Rapid creation of a new version facilitates periodical change of the password.
The well structured help will provide you with useful answers to most of your questions.
Other related information:
This application only uses strong algorithms approved by the NIST and that have been adopted by NSA (National Security Agency), AES-256 (FIPS PUB 197), PBKDF(NIST Special Publication 800-132), SHA-256 (FIPS 180-4).
According to the 2014 Global Security Report, “Weak passwords opened the door to initial intrusion in 31 percent of compromises” and “71 percent of compromise victims did not detect breaches themselves.” Attackers have been diversifying the types of data they target.
“Secure all of your data, and don’t lull yourself into a false sense of security just because you think your payment card data is protected. Assess your entire set of assets—from endpoint to network to application to database. Any vulnerability in any asset could lead to the exposure of data.
Combine ongoing testing and scanning of these assets to identify and fix flaws before an attacker can take advantage of them.”
(Trustwave. (2014). Trustwave Global Security Report. Available: Trustwave Global Security Report.pdf.)