Full-Cycle Encryption with

Circles of Trust™

Working With a Third Party

Data breaches can happen even outside of your company. Often, you will need to send sensitive documents to third parties in manufacturing, supply chain, consulting, etc. If these parties do not have a sufficient data security system in place, nothing is stopping your confidential information from being stolen. Just because your company’s network is protected, does not mean that it is safe from a data breach! It is no longer safe to trust the security systems of a third party as firewalls and perimeter security have consistently proven to be ineffective. The only solution is to protect the data itself. With Circles of Trust™, security persists on the file level. No matter where your sensitive data is shared or stored, you can ensure that it remains encrypted and only accessible by those you trust

Secure Storage on Servers

Traditional encryption does not persist on the file level when data is at rest. Typically, data at rest is protected with a “secure” barrier or firewall. This may be easily circumvented by malicious individuals leaving many sensitive documents stored on DMS, email, or other servers, vulnerable to internal or external threats. With Circles of Trust™ encryption persists on the file level meaning that all data at rest remains encrypted, thus completely secure in the event of a data breach.

Freely Working With Encrypted Data

Circles of Trust™ integrates seamlessly into your computer or mobile device eliminating the workflow disruptions associated with typical encryption solutions; thus circle owners can easily control what an end user in their Circle is able to do with encrypted files.

Learn More
Full-Disk Encryption with

SEAhawk™

Dealing with lost or stolen laptops

With SEAhawk Basic Protection, you don't need to be concerned about data leakage stemming from lost or stolen PCs . All data on the PC's system drive is encrypted and completely illegible (unless, of course, you possess login password).

Traditional security approaches consist of basic full disk encryption of your organization's PC’s; hence protecting all data on the PC’s respective hard drives . This protection covers all the user’s data files, sensitive documents, operating system files, common application files; as well as special Windows files such as the paging file, temporary files, and hibernation file.

In order to start up the PC, the user provides their password at boot time - this enables access to the PC's hard drive. Without this authentication step, the entire disk remains encrypted and illegible for anyone who finds the device.

The government-grade AES encryption cipher employed by SEAhawk ensures that even the most determined attacker would be unable to breach the encryption. The full disk encryption is automatic and transparent so there is no conscious decision to be made by users as to whether a document is sensitive and requires encryption - all data on the drive is automatically and seamlessly encrypted.

Preventing employees from taking sensitive data

SEAhawk Premium Protection allows you to enforce data access policy on removable devices. Typical policy settings can restrict non-encrypted devices to a read-only (or fully blocked) state. The same policy, however, will also allow a user to copy information onto encrypted devices.

Encrypted devices can be shared between other members of the organization on a need-to-know basis. Using either Sharing Passwords or the convenient Group Single Sign-on method for data sharing, groups of workers can exchange information conveniently and securely with each other.

Sharing is contained within the assigned Trust Boundary thus taking information to a user outside of the Trust Boundary is ineffective since it cannot be decrypted - irregardless of if they have the sharing password or not.

Encouraging USB drive use without fear of data loss

SEAhawk Premium Protection allows you to enforce data access policies on removable devices. Typical policy settings can restrict non-encrypted devices to a read-only (or fully blocked) state. The same policy, however, will also allow a user to copy information onto encrypted devices.

Organizations can embrace the use of USB devices, and encourage the use of these drives to reap the productivity benefits provided by these mobile media all while knowing that the content is encrypted and illegible to outsiders. This protection eliminates all concerns of data leakage through lost or stolen USB drives.

Learn More