Our solutions protects both users and data. We are using a combination of the most powerful encryption, access control, and user-behavior monitoring tools available.

As a Microsoft Silver Software Development partner we develop both client and server based software exclusively for Windows operating system. Our technology is scalable for simple „single-user“ implementations as well as for Windows Active Directory infrastructure with more than ten thousand computers. Our two main technologies for monitoring and data encryption – OptimAccess and AreaGuard we develop for more than 15 years.


A robust client providing data collection and user monitoring activities on end work devices. Collected data may be evaluated either on- or off-line and may be analysed in detail, particularly in terms of the security and efficiency of how end work devices are used.

Can be used for:

  • Hardware and software inventorying
  • Monitoring of external devices
  • File operations monitoring on end stations and servers
  • Application start and use monitoring
  • Monitoring visits to risky websites
  • Real-time notifications of users’ risky behaviour
  • Limiting PC users’ risky behaviour by restrictions
  • Data analysis, including anomaly detection using fuzzy logic

OptimAccess technology also fully enables remote administration, deployment and configuration management.


A unique encryption technology using a combination of symmetric and asymmetric encryption in data repositories (disks, cloud repositories, email, etc.). Data is encrypted within the MS Windows environment and may be worked with either on- or off-line.

Can be used for:

  • Encryption of PCs and notebook computers
  • Encryption of user profiles on PC and notebook computers
  • Encryption of files saved on external storage media
  • Encryption of files on shared repositories
  • Encryption of user-defined files, incl. backup of sensitive files
  • Encryption of locally processed and temporary files
  • Secure sharing of encrypted files within working groups

AreaGuard technology includes Encryption Key Management, a server technology designed to manage the lifecycle of encryption keys (generation, distribution to users, expiration, invalidation and recovery). The technology contains a secure depository of encryption keys for renewal and emergency management. It also enables the sharing of encryption keys among users or devices.

Free trial version