+1 (415) 529-5225
info@definisec.com

SSProtect Services

Core Protective Services For Every Account

SSProtect Core Services are aimed at perfecting data protection and use. Apply protection to existing files then continue using as before: The :Foundation Client integrates workflows to maintain protection even while in-use.

:ACCESS FOR MULTI-FACTOR AUTHENTICATION

SSProtect Login Authentication utilizes Duo Security 2FA. Data Access and Management can make use of USB Tokens that use physical touch to emit a standard One-Time Password dispatched to KODiAC Cloud Services for Authentication.

:ASSESS FOR FINE-GRAINED USAGE AUDITING

SSProtect operations are carried out with the :Foundation Client running on your Windows desktop, dispatched to KODiAC Cloud Services hosted by DefiniSec. Transactions are logged in the cloud and used as source material for Analysis and Reporting.

:COLLABORATE FOR POLICY-BASED SHARING

All data access request are routed through KODiAC for Authorization. Share data with your preferred mechanism, and Organization Peers are granted access. External Users are defined by Third Party Trusts configured by Privileged Users.

:CONFIDENTIAL FOR DATA ENCRYPTION

SSProtect uses patented offloading that requires attackers to breach your host and KODiAC to steal plaintext. It also includes In-Place Encryption, automating workflows while protecting in-use plaintext, independent from the applications you use.

AVOID THE FRONT PAGE

:Email for Microsoft Outlook

Executive email represents a grave threat in today’s malicious landscape. Deploy optional :Email to protect Microsoft Outlook message content, then let your leadership team spend more time solving problems than avoiding them.

STABILITY WITHOUT CHANGE

Microsoft Outlook is a challenge for encryption. :Email uses :Expand, simplifying matters. Since 2016, it has been stable with 2 simple adjustments. It just works.

TRIVIAL TO USE

The difference between unprotected Outlook use and :Email-protected encryption is so trivial, there is almost no training and no real reason not to protect data.

NO UNINTENDED DISCLOSURE

:Email automatically enforces message Reply protection when you access a protected thread. Never worry about exposing a thread – :Email handles it.

ENFORCE POLICY CONTROLS

Force protection of plaintext attachments, then have :Email do the rest when needed. Limit Recipient Forward and Reply opreations. and so much more.

Optional Management Services For Privileged Use

Optional Services provide management facilities for IT and Security Teams to maintain continuity and improve Incident Response and Recovery speed, accuracy, and efficiency in the face of complex security events or breaches.

:RECOVER

Data Backup is an integral but optional part of the way Encryption is carried out. Restoration uses the same primitives as regular Data Acces, making certain you always have access to the latest secured version of every managed document for all Users. 

:XRECOVERY

Disaster Recovery uses :Recover data as the source for rebuilding your Organization’s Data Archive. This is delivered in secured, offline-accessible form, which you can download or have delivered using managed media.

:RESPOND –
REMEDIATION

Detect corruption or identify managed content that’s been removed or encrypted by Ransomware, and automatically Restore the last known secured Version from the :Recover Data Archive to maintain Integrity for all Users. 

:RESPOND –
DISCLOSURE RISK

Analysis uses the power of fine-grained, secure :Assess Audit records to show you the, “worst-case” theoretical Disclosure Risk for any given period of time, all of your Users, and all Third Party Trust materials – on-demand.