Encryption is Simple – Use is…Super Simple
Right-click one or more files in File Explorer, choose SSProtect Activate. Continue using SSProtect’d content as always. Protection follows data with automatic workflow integration and central Authorization – with native software.
APPLICATION-INDEPENDENT WORKFLOWS
When you access SSProtect’d content, our software intercepts data file read/ write and offloads decryption for you. When you’re done, the software reverses the process to re-encrypt for you.
IN-USE PLAINTEXT ISOLATION
When we offloading decryption, the resulting plaintext is isolated so that your Application Software can use it, but attackers and malicious resources cannot – for continuous in-use protection.
FINE-GRAINED 2FA W/ PHYSICAL PRESENCE
Our integrated workflow uses optional fine-grained 2FA with a USB Token you touch for KODiAC Cloud Authentication and Authorization. This stops Account Hijacking and Remote Control.
PATENTED CRYPTOGRAPHIC OFFLOADING
Patented Encryption and Decryption offloads crypto operations to KODiAC Cloud Services, which distributes keys requiring an attacker to breach both the cloud and your host to get plaintext.
The Power of Enabling :Recover
You can always access a list of your Managed Files, then choose one to view complete Usage History as shown here. With :Recover, you can Restore your data, even when modified by Organization Peers, but not Third Parties.
AUTOMATIC BACKUPS
When you finishing using SSProtect’d content, workflow integration prompts for your 2FA creds then offloads re-encryption. With :Recover, KODiAC maintains a Version Instance for you to Restore.
PLAINTEXT ISOLATION/ INTEGRITY
Malicious corruption of managed content doesn’t corrupt Backups, which are by design inaccessible to KODiAC Cloud Services, in all circumstances. This stops legal subpoena from enabling surveillance.
RELIABLE BACKUP/ RESTORE
Restore operations are Authorized and carried out using the same logic that’s called when you access Managed Content, ensuring Restore operations are carried out reliably, secured, and with proper data.