View

Sorting

Products found: 14

logo
Offer a reference bonus
0.00

Adeya

SECURE BUSSINESS CONNECTIONS The Adeya solution allows interaction while using various device types. This flexibility allows collaboration between multiple offices, connecting employees working remotely, or organizing meetings with customers or suppliers. The files shared between users are end-to-end encrypted, the client has control over the exchanged content, including encrypted meeting notes. Customization Customize user interfaces for seamless integration with the environment. Unique in its unique capability to integrate with custom cryptographic algorithms Business Connections
Manage communities via a userfriendly and highly secure web application. Efficient management, ability to broadcast information and implement company policies can increase employee engagement and effectiveness of product use Dashbord
Track the use of community members, view and output reports through the dashboard.

SECURE MOBILE COMMUNICATIONS
Adeya is a leading provider of secure, end-to-end encrypted calls, instant messaging, and collaboration tools. Adeya’s cost-effective, easy-to-use solution allows you to securely communicate within your organization anytime, anywhere. The Adeya mobile app is available for most popular operating systems (iOS and Android). It is distributed via a private access point and is, accessible only to users who receive download invitations.
Private contacts
Centrally managed, automatically updated private contact list that is independent of the device’s native contacts.
Encrypted calls
Phone conversations or conferences completely encrypted, voice quality remains intact. PBX integration supported.
Secure Messaging
Encrypted SMS and instant messaging in the workplace. Secure broadcast and group chat among trusted contacts.

SECURE COLLABORATION TOOLS
The Adeya solution allows interaction while using various device types. This flexibility allows collaboration between multiple offices, connecting employees working remotely, or organizing meetings with customers or suppliers. The files shared between users are end-to-end encrypted, the client has control over the exchanged content, including encrypted meeting notes.
Multi-screen application
The design of the application is responsive, assuring the best exprience regardless of device - laptop, tablet or smartphone.
Secure File Sharing
Efficient, end-to-end encrypted file sharing securely exchages, stores and manages your corporate files.
Protected notes taking
Capture ideas, organize and share notes on the go. The best ideas are always synchronized, encrypted and safe.

Adeya can adapt to your information system architecture, investment plans, and hosting strategy. You can operate Adeya’s solution on-premise or on-cloud. Flexible custom deployment options and integration with existing IT systems are all capabilities that make Adeya’s solution unique.
Cloud Deployment - KEY ADVANTAGES
  • Suitable for controlled internalized deploplments.
  • Scalable architecture that can operate between a handful of users to tens of thousands of users.
  • Robust architecture allowing incorporation of multiple redundant sites.
  • Flexible architecture allowing cryptographic customization for cases where the use of national crypto sets may be required.

On premise Deployment - KEY ADVANTAGES
  • Suitable for fast, cost-effective, provisioning, and deployment on Adeya’s Swiss cloud.
  • Hosted in highly secure data centres located within Switzerland.
  • Benefiting from Switzerland’s strict privacy and data protection laws.
  • Set up your community of users in minutes.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Globalscape EFT Arcus

Reduce the complexity of your file transfer infrastructure, increase operational efficiency, and protect your most important data using our secure managed file transfer cloud service. With our MFT cloud service you can:
  • Automate data exchanges between people and systems
  • Gain visibility into the movement of data
  • Replace legacy or homegrown file sharing systems
  • Securely share files internally or externally
  • Facilitate compliance with regulations like SOX, FIPS, HIPAA, CCPA, PCI DSS, and others
What Is EFT Arcus? EFT Arcus can reduce the complexity of your file transfer infrastructure, increase operational efficiency, and protect your most important data. EFT Arcus Benefits With EFT Arcus, you get all of the benefits of a secure managed file transfer solution with the flexibility and affordability of the cloud. Reliable and scalable, this secure cloud MFT platform is an elastic solution that can grow with your business. Because it can be quickly and easily deployed, EFT Arcus allows you to nimbly respond to your changing infrastructure needs. Save the time and resources that would normally be spent managing an on-premises system, and reallocate them toward your business objectives. EFT Arcus Features EFT Arcus is a secure, full-featured, and enterprise-class cloud file transfer service. Whether you need to transfer files among employees, vendors, customers or business partners, this cloud MFT platform offers a centralized solution for all of your data movement activities. Features include:
  • Multi-Protocol Support (including FTP, FTPS, HTTP, HTTPS, SFTP and AS2)
  • Secure Person-to-Person File Sharing
  • Award-Winning Automation
  • Security and Compliance Monitoring
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
4
4
logo
Offer a reference bonus
0.00

Ivanti File Director

Ivanti® File Director enables effortless migration and sync of user files from the local desktop to onpremises or cloud storage, simplifying desktop migration, eliminating data sprawl, and ensuring centralized back-up of corporate data. Effortless File Migration
  • Make Windows 10 Migration Effortless: Ivanti File Director makes migrations fast, secure, and easy for users, with immediate file availability on their new Windows 10 desktop using the same folder structure.
  • Cater for Replacement Devices: Eliminate downtime associated with lost, stolen, or replacement desktop devices, and reduce break/fix or managed service costs with easy recovery of user files.
  • Roam User Files between User Sessions: Ensure user files are instantly accessible between sessions on different desktop devices, whether physical, virtual, or cloud-hosted desktops.
  • Make Corporate Data Available On-the-Move: Deliver secure file access to mobile workforces through native Windows, macOS, iOS, Android, and Web clients. Save a file on your Windows desktop and access it instantly on your smart phone or vice versa!
Awaken Dormant OneDrive Storage
Ivanti File Director helps you reap the benefits of Office 365’s free 1TB per user of OneDrive for Business storage. This simplifies the move to the cloud and helps user adoption of Office 365.
Reduce Data Center Storage Costs
  • By syncing files to OneDrive for Business, you can reduce the cost of on-premises storage for user files and potentially eliminate it completely. This can save your organization thousands of dollars in infrastructure and maintenance costs.
Put IT Back in Control
  • With File Director acting as a broker, IT has complete visibility of how OneDrive storage is being used. And by providing a native user experience without the need for special folders or awkward redirection, no longer must users turn to alternative shadow IT solutions, which are inherently insecure and can lead to compliance issues.
Centralize File Management
With File Director, you can ensure that important business-file data is synced from all devices into one centrally managed location. This can save huge amounts of money caused by downtime, lost data, and compliance issues.
Eliminate Virtual Private Networks (VPNs) File Director eliminates the need to implement VPNs for access to file storage, removing user connection headaches and IT support issues.

Key Feature: Total Sync Control
File Director’s granular control syncs user files to onpremises or cloud storage (OneDrive and Google Drive for Business), and also to every device the user employs. Sync occurs in the background, on demand, or in real time. IT can control which files sync by type, age, size, and path to ensure only relevant content is uploaded to corporate storage.
Elective sync methods allow users access to files as needed, without incurring costly storage or bandwidth penalties associated with limited local disk resources or slow network links.
File Director’s efficient delta sync ensures large files, including in-use Outlook PST files, can be synced from endpoints, sending only relevant changes. This reduces network traffic and sync time significantly and provides complete endpoint coverage of users’ data requirements.

Key Feature: In-Location Sync
The In-Location Sync feature ensures user files are synced to on-premises or cloud storage from their current folders and locations. Files within a user’s existing profile are synced automatically from their current location, for example, from the Desktop, Documents, Pictures, or Downloads folders, without redirection or file copies. The feature also ensures that applications work as before, and that Windows Search can still index them.
Users continue to save their files locally on their endpoint, in the usual folders, without having to move or copy them to a specific folder for them to be synced. This eliminates the need for user re-training, as all file-sync and migration actions are imperceptible to the user, and ensures a native user experience.

Key Feature: Mapped Drive Emulation
Usually in Windows when a file share is mapped to a drive letter, the files become inaccessible when the user goes offline. This can lead to user dissatisfaction, productivity loss, and additional complexity associated with VPN connections and support.
File Director’s Mapped Drive Emulation lets users view and access files on mapped drives even when offline. All content is searchable and files that have been accessed before going offline remain accessible for viewing and editing.
Any files that are edited offline are then synced automatically to on-premises or cloud storage as soon as a network connection becomes available.

Key Feature: Ghost and Placeholder Files
The sync mechanism included with File Director enables users to list files held centrally in your on-premises or cloud storage without first having to download the files locally. This introduces huge savings on network usage, particularly for devices being used over limited bandwidth connections, and allows users to search files while offline.

Key Feature: Cache Management
Cache Management provides administrators with a method to deliver up to 1TB of cloud or on-premises storage to users, regardless of the disk space available locally. File Director can both deliver and clean up files when the user has finished working with them.
On RD Session Host and VDI—particularly where disk space is limited—File Director removes the headache of server or cloud storage exceeding the disk space available on the server, ensuring a seamless experience for the user regardless of desktop platform or storage type.

Key Feature: Hardened Data Center Virtual Appliance
File Director is delivered in a hardened virtual appliance that can be utilized on-premises or within a hybrid or full cloud environment.

... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Ivanti User Workspace Manager (UWM)

Ivanti User Workspace Manager enables an unparalleled user experience, increases productivity, and liberates IT from the shackles of slow and complex desktop tools. With Ivanti, migration to Windows 10 and adoption of cloud services, including Office 365, is smooth, risk-free, and simplified for both IT and users alike.
  • Effortless user migration.Migrate user profiles, settings, and files to Windows 10 with or without hardware refresh—with no disruption to the user and minimal effort for IT.
  • Ease the move to the cloud. Smooth your journey to the cloud by roaming the user experience seamlessly between on-premises and cloud infrastructure using scalable, robust web services.
  • Ensure a great user experience. Eliminate logon scripts, eradicate complex group policy configuration, and deliver just-in-time personalization for lightning logon times. Ensure fast desktop and application response.

Simplify Digital Workspace Management
Ivanti User Workspace Manager enables organizations to reap the benefits of Ivanti solutions such as Environment Manager, File Director, Performance Manager, Application Control, and Insight:
  • Agile Windows migration. Achieve future-proof, continuous migration with ease
  • Easy file management. Eliminate data sprawl and reduce data center costs
  • Faster cloud adoption. Consistent on-premises, hybrid, or full-cloud desktops
  • Better user experience. Higher user acceptance of desktop transformation projects
  • Greater security and compliance. Out-of-the-box protection against unknown threats

Transform the User Workspace With User Workspace Manager, you can deliver responsive, secure desktops that users love, save money on server hardware, reduce IT management, and eliminate security risks. Detect challenges affecting user experience, quantify what is causing the issues, and benchmark how IT changes can optimize your endpoints. Patented resource management techniques ensure users are provided with the best desktop performance possible and increase user density in virtual desktop environments — often by as much as 40 percent. Abstracting users’ personal settings and files from the underlying device and operating system enables effortless migration to new desktops, platforms, or services, providing a consistent and familiar workspace for mobile users.
Powerful application control and privilege management capabilities ensure secure desktop and server environments and ease the burden of satisfying regulatory compliance.

Key Feature: User Personalization
On-demand personalization eliminates typical problems associated with roaming profiles including slow logon times due to profile bloat, and loss of personal settings and helpdesk calls due to profile corruption.
Stream personal settings as required, at application start or stop, to alleviate the burden on the logon process and provide rapid logon times.
Roll back personal settings on a per-application basis to reduce profile-related support calls and eliminate user downtime. Bulk updates on centrally-stored profile data equip IT with new problem-solving capabilities and ease the process of rolling out network changes to user sessions.

Key Feature: Desktop Configuration
The multi-threaded logon engine in User Workspace Manager replaces slow and complex logon scripts and GPO settings with context-aware actions that can be applied simultaneously at logon, rather than one-after-the-other.
Desktop configuration items typically configured to apply at logon can alternatively be set up to occur throughout the user session, on-demand, to reduce the burden on the logon process. This provides even quicker logon times and a much-improved user experience.

Key Feature: File Sync and Migration
The granular sync mechanism in User Workspace Manager allows users’ files to be synced to on-premises or cloudbased storage from anywhere within their user profile — either in the background, on-demand, or in real-time—to provide effortless migration of users’ files and eliminate the issue of data sprawl where user files are saved across different devices.
What’s more, migrating user files from on-premises storage to the cloud also means you reap the benefits of the 1TB of free OneDrive for Business storage per user with every license of Office 365.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

odix FileWall

odix - a market leader in Enterprise CDR (content disarm & reconstruction – file sanitization), is now offering native CDR plugin for all Office 365 mailboxes. CDR is a technology that complements existing malware and sandbox solutions and is additive to Microsoft’s EOP & ATP offerings, ensuring complete prevention a>gainst zero-day and APT attacks delivered via email attachments. Why companies need FileWall for Microsoft 365 mail? Over 94% of malware is delivered via email (source: Verizon business (2019 Data Breach Investigations Report). In general, hackers hide malware in standard files such as PDFs and Office documents to transfer their malicious code and spread it as an epidemic. As new unknown malwares are released daily, they manage to bypass the standard security systems which use detection-based methods for anti-malware. The problem with unknown malware hidden in files is that not always it’s delivered by suspicious sender but sometime can be sent by trusted sender (i.e. employee within the company) who somehow got an infected file and forward it innocently. In fact, 34% of cyber attacks involve internal actors within the organizations. Advanced threats require NextGen malware prevention technology FileWall™ by odix offers an effective plugin based on its patented algorithm for eliminating malware hidden in files. Instead of trying to detect a known malware and block the file for the user, the FileWall™ service disarms malware and provides a sanitized file for safe usage. FileWall™ provides an effective malware prevention solution against both known and unknown malware attacks and handles all incoming email traffic including internal emails. The FileWall™ advanced attachment security add-on for Microsoft 365 mail includes:
  • Seamless deployment- one click service activation
  • Advanced email attachments handling for both internal and external senders.
  • FileWall™ doesn’t harm/change any of Microsoft sender related security capabilities
  • Deep file inspection capabilities (archive, password protected etc).
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
18
11
logo
Offer a reference bonus
0.00

Post-Quantum Quantum-Resistant Encyption

Why Quantum-resistant?

Post-Quantum enables organisations to protect their data against code-breaking quantum computers. We offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks. It can be deployed as stand-alone encryption, replacing today’s vulnerable crypto-systems, or in conjunction with current standards, to provide compliance in the present as well as future security.

Never-The-Same

Our encryption is known as ‘Never-The-Same’, or NTS. This comes from the fact that the algorithm never generates the same ciphertext twice, even when the plaintext and encryption keys remain constant. Independent security analysis by Royal Holloway, University of London concluded that NTS is secure against chosen-ciphertext attack (CCA). Since our algorithm produces varying outputs, our encryption is considered semantically secure. This means that the ciphertext reveals nothing about the plaintext that can be feasibly extracted by computational means. NTS is based on the McEliece cryptosystem, which relies on injecting random noise into a message. This noise is removed on decryption using error correcting techniques derived from the field of digital and satellite communication. Our co-founder Professor Martin Tomlinson is an expert in this area, having co-invented Tomlinson-Harashima Pre-coding, a data protocol used in many forms of satellite communication. Post-Quantum has resolved the challenge of large key sizes that made the McEliece system impractical for many use cases. Both public key size and ciphertext size are smaller in NTS than in the standard McEliece cryptosystem. The public key size is reduced by 50% or more, and the ciphertext size is reduced by at least 10%.

VPN

The VPN is an essential tool for organisations’ staff, but it provides a route into an organisation’s systems for attackers. The key vulnerabilities are weaknesses in the cryptography securing the connection, and the user login and authentication process. The current VPN standard, the Diffie-Hellman-based Internet Key Exchange Protocol, is vulnerable to attacks by quantum computers. Organisations need to introduce a quantum-resistant process, while maintaining compatibility with existing systems. Post-Quantum’s system enables quantum-safe key exchange, used if both sides of the connection are compatible with it, with the current standard (IKEv2) available if not. Complete replacement of current key exchange systems would not offer the necessary assurance in the encryption system, so introducing an additional quantum-safe key exchange gives greater confidence. Our system aligns with NIST’s approach, recognising hybrid modes in which quantum-resistant algorithms are a component of an overall system that is FIPS compliant. We have developed our system in line with Gartner’s recommendation of crypto-agility (‘Better Safe Than Sorry: Preparing for Crypto-Agility’, Gartner ID: G00323350), to help organisations end dependence on a single protocol. We can ensure a simple transition to the post-quantum era. Post-Quantum can also enhance the login process, with user-friendly biometrics-based identity verification that cryptographically binds the user’s identity to their session.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Prim‘X Technologies Cryhod

Anti-theft encryption For a company, the damages associated with the theft or loss of a laptop amount to far more than just the value of the hardware. Losing the information stored on a laptop’s hard disk or the mere communication of that information to a third party can generate all sorts of serious problems: recovery of sensitive information by the competition, damage to brand image, etc., to say nothing of the possible legal and regulatory implications in the event of a breach or an offence. Full-disk encryption The Cryhod full-disk encryption solution shields your company from these risks. Cryhod is a modern encryption software offering full-disk encryption of all your company’s mobile workstations. With Cryhod, data can only be accessed by users who are authorized and duly authenticated at pre-boot. Features: Encryption
  • Encryption of entire disks and/or partitions (including system partition)
  • Encryption on-the-fly, transparent for users
  • Transparent initial encryption of disk/partitions
  • Secure initial encryption, with automatic recovery in case of a service interruption (power outage, workstation shutdown, etc.)
Administration
  • Pre-boot authentication (before start-up)
  • Free choice of authentication mode: password or certificate
  • SSO with Windows session opening
  • Secure hibernation
  • Single-user or multiple-access workstation
User Authentication
  • Flexible and easy to deploy
  • Simple to operate and supervise (scheduling via GPO)
  • Integrated user recovery and troubleshooting
  • Compatibility and cooperation with ZoneCentral for «Right-to-Know» management
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Prove & Run ProvenVisor

ProvenVisor is a hypervisor for use in embedded connected devices. It is a software hypervisor executed directly on the bare metal (i.e. a type-1 hypervisor) that emulates the hardware layer, making it possible to run multiple OSs on a single hardware platform. ProvenVisor is useful when there is no hardware implementation for a trusted execution environment (TEE) as in TrustZone or when the TEE is not available on the chosen device, often because the system-on-a-chip (SoC) manufacturer reserved its usage. It is also useful to run multiple rich OSs or other security OSs, a scenario arising when legacy applications are expensive to port from one OS to the other. Use Cases If a hypervisor is used in a connected device, the overall security can be dependent on the presence of exploitable vulnerabilities in the hypervisor itself. If ProvenCore and another OS are executed on top of a vulnerable hypervisor, then the overall security of the device can be compromised. To solve this issue, we developed ProvenVisor using formal methods and we have started the process required to obtain a of Common Criteria certification. Professional Services In addition to ready-made security COTS such as ProvenCore and ProvenVisor, Prove & Run offers a range of professional services to:
  • Help our customers design/build/develop secure software and/or integrate our COTS,
  • Help our customers secure their existing architectures:
    • Performing security analyses
    • Revamping existing architectures for security with ad-hoc solutions: Secure Boot, secure Over-the-Air firmware update, firewalling, intrusion detection/protection solutions, authentication, secure storage, etc…
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Segusoft Segulink

Trusted Data Exchange for your Business.
  • End-to-end encryption. Your files and messages are securely encrypted, before they leave your device. Only the recipient can decrypt the data.
  • For files and messages. Protect an arbitrary number of files - without size limits. You may also only encrypt your message.
  • Traceable and controlled. Compliance for your data exchange: Keep track of what was sent and received.
  • With your account. Authenticate yourself with your already existing accounts. You don't have to memorize an additional password!
  • In the Hybrid Cloud. Use your business storage or your preferred cloud storage providers for exchanging encrypted files and messages.
  • Or directly! You can also transfer your files and messages directly - without any intermediate storage. Simply from App-to-App.
Why Segulink?
  • Easy handling. Use your dashboard for an overview about which files have been sent to you, or what you have sent to other participants. Directly go to your inbox, the key management or get a summary about former activities in the reporting center.
  • Ad-hoc data exchange. Your employees and business partners are able to exchange files and messages, even without registration with SEGULINK. Every authenticated user has an individual upload area for business partners.
  • Keep control even after sending. Define exchange rules, e.g. how often a message can be downloaded, when a message is obsolete or that the recipient can only view the transferred documents inside the SEGULINK application (for PDF documents).
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SendSafely Platform

SendSafely lets you easily exchange encrypted files and information with anyone on any device. Let us take the headache out of secure file exchange. The perfect balance of security and usability
  • Easy to Use. SendSafely works natively with all major browsers. No software to install, no encryption keys to manage.
  • Secure & Compliant. Use SendSafely for compliance with regulations like HIPAA (BAA available), GDPR, CCPA and more.
  • Integrated. Use one of our pre-built platform connectors or easily create your own integration with our developer API.
  • Enterprise Ready. Features designed for businesses such as user administration, single sign on and custom branding.
One platform, many uses SendSafely integrates with many popular third party systems, adding end-to-end encryption to the platforms your users already know and love. Extend the capabilities of your existing apps and infrastructure by seamlessly adding encryption to your existing workflows.
  • Secure Email. Pre-built integrations for Outlook and Gmail encrypt messages and attachments with the click of a button, or use our email gateway to automatically protect all outbound email.
  • Secure File Exchange. Our secure file exchange portal lets you send and receive very large files securely from anyone, and you can collaborate across teams using our Secure Workspace feature.
  • Help Desk Integrations. Secure your support workflow with native apps for Zendesk, Salesforce Service Cloud and Freshdesk. Our Dropzone also integrates with many popular help desk platforms.
  • SendSafely Dropzone. Securely collect files from any user on any device. Use our turn-key hosted version or embed the Drozpone on your own website. You can even integrate the Dropzone with your existing workflows.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SendThisFile

Secure file transfers serving Fortune 500 and small business. Advanced encryption, powerful security, privacy compliance and complete customization. Features: Send Files Sending large files free is really easy. Just create your free account, sign in and select the file to upload. You can trust that your private data is secure with a 128-bit end-to-end encryption. Once the upload is complete, an email is automatically sent to your recipient with instructions for access. Only the recipient with access to the email link may download the shared file. No need to worry about what happens to the file once it is on our secure servers. When your file expires, the data is securely shredded and removed permanently from our servers, there's no worry about if it still exists out there in the cloud. Receive Files You can use a Filebox to receive large files. Each Filebox is hosted on its own unique URL and provides users with simple step-by-step instructions for uploading and sharing files. Just give your personalized link to any person who you'd to receive files from and ask them to use it to send the files. It's easy for them and you. They won't even need a SendThisFile account. When they sent their files, you'll receive a notification email with a link to the files they've sent to you. Security At SendThisFile, we safeguard data during transit. In fact, it's paramount to the very core of our business. We do not view your data, share your email addresses, or resell your information in any way, we simply send files securely. We value our customers' privacy and have maintained our business by preserving our high standards of integrity. Compliance We are dedicated to providing industry leading security and regulatory compliance to our customers. SendThisFile, Inc. and our partners comply with specialized regulatory requirements that our small, medium, and Fortune 500 customers must meet. As such, we are able to provide a compliant file transfer service to customers who must meet stringent data privacy and data security regulations. Replace FTP Many companies started using FTP applications before computers had operating systems with graphical user interfaces. They were clunky, very technical and complicated to use. And on top of all that - insecure. With FTP not much has changed! As an FTP alternative, SendThisFile offers a managed file transfer solution that is secure, fast, and allows you to easily send large files, it can effectively replace FTP. Tracking We understand how critical it is for you to maintain control over private data at all times. This is why our managed file transfer system enables you to closely track and monitor every secure file transfer. Outlook Plugin After installing the SendThisFile Outlook plugin, you simply create a new email, reply or forward as you normally would, attach files and click send. It automatically removes email attachments and inserts a safe and secure download link.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SEPPmail AG Large File Transfer (LFT)

Up to now you were blocked by the limitations of your Internet service provider. This is over now: Send incredibly large files of several gigabytes just by normal email. The sender sends his large files with hi usual mail program as a normal attachment. The receipient then automatically gets a link to download the file. Everybody knows the problem of reaching the size limit when sending emails with large file attachments. Either the senders or the receipients email system throws an error and rejects the large message. SEPPmail provides an easy-to-use solution for this day-to-day problem.
  • If the size of a message exceeds a configurable limit this message is hold back on the SEPPmail gateway and is encrypted.
  • The receipient gets a GINA message where he can securely download the oversized attachment(s).
  • The storage time of the messages is limited and configurable
  • In the first contact the receipient gets an initial password delivered by SMS
Advantages:
  • Data does not leave the company into cloud systems, but will be provided encrypted for downloading over a secure channel
  • Data is sent comfortably with the usual mail client without any further interaction of the sender
  • Also an external sender can supply a huge amount of data onto the GINA portal
  • The product can be purchased and installed as an extention to an existing Secure Email Gaeway or also as stand-alone application
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Shadline

Shadline supports 3 layers of defence

  • Increase your daily security
  • Limit a cyber attack
  • Prevent a global black-out
Features:

  • Communication
  • Transfer
  • Storage
  • Administration
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Surevine Threatvine

Threatvine is a next generation cyber-security information sharing platform designed for secure cross-organisational collaboration and collaborative intelligence analysis. Threatvine is the UK’s national platform for cyber security information sharing. Features
  • Social. Connect your trusted members to enable sharing by default
  • Information handling. Industry recognised information handling e.g. Traffic Light Protocol, to control sharing
  • Incident reporting. Quick and efficient sharing through structured data
  • Anonymity. Allows for Anonymous, but trusted, contributions
Benefits:
  • Securely share outside the walled garden of your organisation
  • Helps your supply chain to work together to defend themselves against threats
  • Advance warning of potential threats
  • Understand issues that affect other organisations, including cross-sector
  • Share knowledge and skills to help other organisations
  • Joins up your organisations and individuals simply, as/when you need to
  • Knowledge sharing, from threat analysts to network defenders
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.