Protecting intellectual property and sensitive information is a top security concern for any business today. Co-workers need to share documents and files with colleagues, customers and partners on a daily basis, and frequently those items contain confidential information. File encryption helps to secure that information, minimizing the risk of it being accessed by unauthorized users. Cryptzone’s file encryption software goes much further, creating a secure platform for co-workers to collaborate.

Secured eFile enables people to share files and folders securely with individuals and groups inside and outside the organization. The easy-to-use file encryption tool empowers users to secure the information and specify precisely who else in the organization needs access. A central management console allows administrators to deploy security policies across the organization, while built-in technology takes care of managing access rights, user authentication and encryption keys. With Secured eFile you ensure that users, customers and partners have access to the information they need, whilst protecting against those who don’t.

Business Benefits

  • File security with a simple click

    Secured eFile empowers users to encrypt files and folders through intuitive tools that are integrated into the standard user interface. Users can encrypt files or even complete folders and assign access rights for users or groups within the organization’s Active Directory. A ’key’ icon clearly shows when a document has been secured and locked.

  • Control access to secured files

    Users can control who can access a secured file by assigning access rights to other users or groups within the organization’s Active Directory. Administrators can define policies to manage sharing rights for users or groups and can also create groups or departments with particular access rights.

  • Central management and control

    The centralized administration console empowers IT administrators to manage licenses, policies, and user access rights. Integration with Active Directory® makes setting up groups for file security simple. The management console also includes extensive reporting tools for auditing of file security policies, as well as regulatory compliance.

  • Share secured files and folders using Dropbox

    Using Secured eFile users can easily share encrypted files and folders with colleagues and external parties using Dropbox. Users simply add encrypted data to the shared Dropbox folder and the data is stored securely synced and encrypted.

  • Sharing secured documents externally

    Users can share information securely with partners and customers and the recipient doesn’t need to install any software to access the file. The document owner can create a self-running executable package and set a password. This file can then be sent out via email, USB, or other removable media. The recipient just needs to input the password to open the file and can then edit, save and return the documents securely.

  • Security travels with documents

    Security travels with documents

    Documents secured with Secured eFile can be moved or copied and stored securely on shared network drives, FTP servers, application servers, desktops, USB flash drives, CDs/DVDs and external hard drives. Copies taken using backup software will automatically stay secured. Encrypted documents carry user access rights with them to protect against unauthorized access.

  • Regulatory Compliance

    Regulatory compliance

    Cryptzone’s technology is designed to help customers meet regulatory compliance. Strong FIPS certified AES256 encryption complies with the Sarbanes Oxley Act (SOX), GLBA, HIPAA Hitech, FTC Red Flag Rules and many others. Security policies are automatically enforced for all users, and detailed reporting of user actions provides a comprehensive audit trail.

Top Features

  • Automated authentication and key management

    Secured eFile comes with built-in authentication and encryption key technology - there’s no need for a separate public or private key system. Cryptzone’s EPM technology handles user authentication and key management automatically, eliminating the headache for users and administrators.
    Client authentication can be customized depending on the need for user identity verification, from single sign-on (SSO) using Windows authentication to authenticating users every time a secured document is opened. Roles assigned to the user then controls what can be viewed, edited or created.

  • OTP Support for system access

    The Simple Encryption Platform comes with One Time Password support offering even greater security protection. By activating OTP, a user accessing secured documents, files and folders must enter a One Time Password that is sent to the users mobile phone. Only after authentication will the user be able to open, edit and modify secured documents, files and folders within a limited time period.

  • Data protection at every stage

    In every secured folder Secured eFile provides a secure recycle bin that travels with the folder. Files deleted within the folder are stored in the secure recycle bin rather than the standard, unencrypted Windows recycle bin, and users can also restore deleted files from the secure recycle bin. Secured files and folders deleted on the computer will be stored, still secured, in the standard Windows recycle bin just like any other file.

  • Central control of the user’s environment

    The SEP Management Console allows administrators to define, monitor and enforce information security policies, ensuring a consistent policy for all users or customized policies for groups or individual users. It is possible to limit who a user can share secured documents with eg. HR might only be able to add access rights for other HR team members.

  • Automatic data compression

    Data is automatically compressed by a factor of up to 5:1 during the encryption process, significantly increasing storage capacity.

  • Helpdesk password recovery

    When users forget or lose a password, Secured eFile comes with a built-in feature to support the HelpDesk with password recovery.

  • Brute force protection

    A built-in brute force protection system protects the inherent encryption methodology against professional hackers.

  • Central control and reporting

    The Simple Encryption Platform provides central management, control and reporting for administrators. The SEP uses Global Objects Synchronization allowing the intelligent client to communicate with the SEP manager for real time reporting of data movements and user actions. The SEP can run on a virtual server (VMWare).

Technical Specifications

SEP Client Requirements

Client Hardware Hardware:
  • Pentium 2.2 GHz processor
  • 512 MB of RAM
  • 100MB available hard disk space
Supported Operating Systems: SEP Client is Windows 7 Certified
  • Microsoft Windows® 8
  • Microsoft Windows® 7
  • Microsoft Windows® Vista
  • SEP driverless client (Secured eUSB is not supported on Windows servers):
    • Microsoft Windows® Server 2003, 2008, 2008 R2, 2012
General Requirements:
  • Internet connection
  • Microsoft Internet Explorer® 7 or higher

SEP Management Console

Client Hardware Hardware Minimum Requirements:
  • Computer/Processor with Pentium 1.5 GHz
  • 2 GB of RAM
  • 500 MB of available hard disk space
Supported Operating Systems:
  • Windows® Server 2012
  • Windows® Server 2008 SP2, 2008 R2 SP1
  • Windows® Server 2003 SP3, 2003 R2
  • Windows® 8
  • Windows® 7 SP1
  • Windows® Vista SP2
General & Software Requirements:
  • Internet connection
  • Microsoft .Net Framework 4.0
  • Request a Call

Customer Success Stories

To see all Customer Success Stories and Case Studies relating to this product, please click here.

  • NCC Construction

    Large workplaces must take effective security measures. The priority is to guarantee the safety of the employees and ensure they can perform their assignments under safe circumstances. But it is also important to secure the organization’s data and resources, to protect the company whilst also supporting a smooth workflow and secure working environment. Download the Case Study

  • Frederick County

    In common with all local government organizations, Frederick County holds a lot of personal information about people living and working in the area.
    Recognizing the potential impact that a data breach could have, the team at Frederick County wanted to take a proactive approach to data protection, using data encryption to improve security of confidential information and to prevent it getting into the wrong hands. Download the Case Study

  • Request a Call

Simple Encryption Platform

Simple Encryption Platform Concept Image

The Simple Encryption Platform from Cryptzone is designed to empower end users to secure data easily. Whether information is in transit; email, flash drives, portable media, or stored on a corporate network or SharePoint intranet, SEP will secure it.

The struggle for data control within organizations is not a new problem as laws and regulations dictate compliance. Historically encryption solutions have been notoriously difficult to implement, use and manage with many organizations hesitating to implement encryption solutions. With SEP from Cryptzone, encrypt and secure data with its simple encryption technology at the click of a button or implement policies to do this automatically.

Products in the Simple Encryption Platform

Resources & Related Literature

Other Literature

Data Sheets: PDF Download

Secured eFile