IN-PLACE ENCRYPTION + CRYPTO-OFFLOADING
Protect documents and get
in-use isolation without sacrificing application flexibility
In-Place Encryption automates access to encrypted content, acquiring 2FA credentials and decrypting/ re-encrypting for you while isolating plaintext in your preferred applications. Patented KODiAC cryptographic offloading forces attackers to breach your host and our cloud at the same time, elevating protective posture.
SEE THE VIDEOGet the 1-page Brief
KODiAC Cloud Services Delivers Central Visibility and Control
We spent years perfecting innovations to simplify encryption for end-users while complicating matters for attackers. Results drive our integrated platform for IT and Security Teams to improve service quality across the board. Further discoveries now let these same teams literally change the game with Advanced Response and Recovery facilities.
Enhanced User Productivity
Our innovation removes traditional challenges using encrypted data and instead delivers enhanced productivity tools that improve end-user efficiency.
Increased Business Continuity
Replicate protected content on new hosts, replace corrupted/ Ransomware’d content, or rebuild with offline Archives. Minimize malicious intent with constant availability.
Improved Response and Recovery
Our approach generates high-accuracy Usage data as the source to Objective Disclosure Risk Analysis, avoiding costly investigation to prioritize focused response.
CORE INTEGRATION FOR LAYERED SERVICES
SSProtect and KODiAC Innovation
We deploy and manage KODiAC Cloud Services that your SSProtect desktop client uses to carry out protective and management services for your sensitive data. Unique innovation ensures this is secure, scalable, and non-disruptive while retaining application and infrastucture flexibilty.
USER IN-PLACE ENCRYPTION
In-Place Encryption coordinates automated workflows, in-use data isolation, and KODiAC offloading while maintaining compatibility with software, services, and infrastructure.
CRYPTO-OFFLOADING PLATFORM
Distribute cryptographic keys for theoretical protection unless the host and KODiAC are both compromised, centralizing control and visibility at the heart of the system.
FAST ADAPTIVE FILTERING
Adaptive Filtering maintains data location independence and supports continuous, in-use plaintext data isolation to address critical challenges in supporting end-user needs.
NO PROGRAMMING FRAMEWORKS
Building system services from the ground up is challenging, but avoids overhead and bloat to maximize performance while eradicating shortcomings attackers exploit.
Early Adopter Feedback
We aggressively pursued Early Adopter feedback before going to production. Here’s some of what we heard:
You’re doing things people don’t even dream about. We like that you’re focused on one single thing. That’s powerful.
Alliance Manager
Leading Forensic Software Provider
How did you guys do that? Seriously how? Everyone talks about transparent encryption, and you really do it. Wow!
Chief Information Officer
Medium-sized Multinational Law Firm
This is probably the most secure platform we’ve ever seen for desktop use, and we need it now more than ever.
APT Expert
Govt. Agency w/ Classified APT Briefings
Extensive Online Documentation
With 100+ articles, you have everything you need to make the most of SSProtect: