+1 (415) 529-5225
info@definisec.com

Seamless Protection

Encryption is Simple – Use is…Super Simple

Right-click one or more files in File Explorer, choose SSProtect Activate. Continue using SSProtect’d content as always. Protection follows data with automatic workflow integration and central Authorization – with native software.

APPLICATION-INDEPENDENT WORKFLOWS

When you access SSProtect’d content, our software intercepts data file read/ write and offloads decryption for you. When you’re done, the software reverses the process to re-encrypt for you.

IN-USE PLAINTEXT ISOLATION

When we offloading decryption, the resulting plaintext is isolated so that your Application Software can use it, but attackers and malicious resources cannot – for continuous in-use protection.

FINE-GRAINED 2FA W/ PHYSICAL PRESENCE

Our integrated workflow uses optional fine-grained 2FA with a USB Token you touch for KODiAC Cloud Authentication and Authorization. This stops Account Hijacking and Remote Control.

PATENTED CRYPTOGRAPHIC OFFLOADING

Patented Encryption and Decryption offloads crypto operations to KODiAC Cloud Services, which distributes keys requiring an attacker to breach both the cloud and your host to get plaintext.

The Power of Enabling :Recover

You can always access a list of your Managed Files, then choose one to view complete Usage History as shown here. With :Recover, you can Restore your data, even when modified by Organization Peers, but not Third Parties.

AUTOMATIC BACKUPS

When you finishing using SSProtect’d content, workflow integration prompts for your 2FA creds then offloads re-encryption. With :Recover, KODiAC maintains a Version Instance for you to Restore.

PLAINTEXT ISOLATION/ INTEGRITY

Malicious corruption of managed content doesn’t corrupt Backups, which are by design inaccessible to KODiAC Cloud Services, in all circumstances. This stops legal subpoena from enabling surveillance.

RELIABLE BACKUP/ RESTORE

Restore operations are Authorized and carried out using the same logic that’s called when you access Managed Content, ensuring Restore operations are carried out reliably, secured, and with proper data.