Your organization, too, certainly creates, processes and archives sensitive and confidential data – your own or belonging to your business partners.
These could be your know-how, contracts, pricelists, employees' personal information, and much more.
Data encryption on computers and network storage units prevents your data from getting into unauthorized hands.
Data protection is an integral part of functioning of companies, institution, and individuals.
File data encryption can save you a significant amount of trouble.
Protects important data stored in computers, on the company’s network, and on external storage devices used to transfer data outside, even in case of loss, theft or confiscation of computers or data storages.
Limits the administrators' access to the content of your computers and network storages while keeping the rights to manage these (moving data, backups, etc.).
Prevents access to information in the files during a service or warranty claim. Contents of your files remain hidden.
Secures sharing of private information within a specified group of users.
Limits access of unwanted removable devices to corporate computers, such as USB flash drives or external drives.
Protects offline e-mail folders containing the entire e-mail communication, including attachments.
Enables 2-factor authentication to increase identity protection.
Provides privacy protection in compliance with the EU legislation for institutions since May 2018 (GDPR).
How SODAT Encryption Works
SODAT Encryption protects data and information stored in computers, laptops, and on other devices – in a company internal network, on the go, and at home, without any specific requirements of the end-user or administrator (does not require changes in workflow). Designated data is securely encrypted, rendered unusable and illegible for an unauthorized person.
In case of loss, confiscation or theft of a computer with data storage containing confidential information, it is not possible to recover the encrypted data.
If you need to transfer data outside your organization, for example to your business partner, you can use a portable key which decrypts data with a password of your choice. The data on the portable storage remains securely protected at all times.
The automated system and optimal usage of resources during encryption in the Microsoft Network ensure minimal operating requirements.
There are no problems as with full-disk encryption, such as hardware difficulties, slowdown of work, an additional login to remember, or a complete loss of data when hardware fails due to dependencies.
SODAT Encryption provides protection against connecting unauthorized external USB drives, and protects external storage devices used for data exchange and sharing. It identifies the type, manufacturer and production number of a device, all of which can be implemented into the rules set for individuals, groups or the entire company domain network with all its clients. Your key selection will determine whether the data will be legible only to one user, a group of colleagues, or to the whole company.
SODAT Encryption provides simple and effective management of the encryption rules and USB device handling.
The Admin Console allows you to perform the installation and all the settings centrally. Encryption rules can be set for individuals or groups of users. Installation and data encryption is performed in the background. The client installation communicates with the administration console in the background, sending then information about the completed encryption process and other important events. Users cannot change the settings deliberately, therefore compliance with the security rules is ensured.
An administrator can change the settings of the encrypted areas immediately. The application interface also allows displaying the status of both encrypted and unencrypted files sorted by their usage and type (document, media, drawings, tables, etc.).
The secured login to the operating system is ensured with 2-factor authentication through our credential provider. After logging into the operating system, it is possible to use chip cards and USB tokens that support the standard PKCS #11. Hardware items meet the most strict standards regarding security of the information stored on them. To provide these hardware solutions, we use products of the Safenet Company. The benefits of logging in with tokens are especially great in case of multiple user accounts.
Database backups and the architecture of the products secures and protects encryption keys from loss.
Additionally, SODAT Encryption provides the possibility of emergency recovery of encryption keys, even when the device is located outside the organization with no internet connection.
As of today, our solutions are used by many happy customers in the Czech Republic and neighbouring countries.