Disks and USB drives
360° encryption
No matter the size of your business, you have data to protect. Where is your data located? How can you ensure the confidentiality of your data? What use case should I start with? Click on a zone, the encryption solution that is made for you will appear!
Vos besoins portent sur...
Email file exchanges
EFSS & Cloud
File libraries
Files shares
User environment
Disks and USB drives
PROTECT YOUR DEVICE AND THE DATA THEY CONTAIN!
CRYHOD : Encryption for laptops and disks
For a company, the damages associated with the theft or loss of a laptop amount to far more than just the value of the hardware.
CRYHOD enables the company to protect employee equipment taken off the premises according to a global and managed strategy.
CRYHOD protects devices such as laptops, USB flash drives, external hard drives, or VMs (local or in the Cloud).
ZONECENTRAL : Confidentiality and partitioning
For a company, provide a confidentiality service applicable to all of an organisation’s files is essential to guarantee the confidentiality of its sensitive data.
ZONECENTRAL automatically applies the enterprise encryption policy in order to protect all files and sensitive zones on the workstation.
ZONECENTRAL is easy to deploy and free of any organizational constraints. It can suit to suit any type of infrastructure and integrates flexible administration mechanisms.
Email file exchanges
Make sure your data remain confidential,
even in transit
ZED! : CONTAINER FOR CONFIDENTIAL DOCUMENTS
With the mass development of inter-company collaboration (subcontracting, trade specialisation, globalisation), the exchange or sharing of confidential documents (contracts, technical drawings, price schedules, etc.) with third parties is frequent and securing them is absolutely essential.
ZED! encrypted containers can be used to protect these documents with a “secret” means of access for each correspondent. Each correspondent will then be able to reuse this secure container for future exchanges. Regardless of the mode of transport, ZED! is an interpersonal, universal and multi-platform means of exchanging documents and files, with a free version for recipients without the full solution.
ZEDMAIL : Encrypt your messages and attachments
ZEDMAIL (MS Outlook™) makes it possible to deploy a transparent encryption policy for all an organisation’s internal e-mails, with or without file attachments, and according to predefined rules (by domain, by keywords or via a classification process).
For a recipient (internal or external) not equipped with ZEDMAIL, simply add an additional password which can be stored in a password wallet.
The recipient will then be able to use ZED! or its free version to read and answer in encrypted form.
EFSS & Cloud
PRESERVE YOUR DATA IN THE CLOUD
ORIZON : CONFIDENTIALITY OF DOCUMENTS IN THE CLOUD
File synchronization services in the Cloud or in an internal enterprise file sync & share (EFSS) type system for storage, sharing, and backup expose data to the risk of theft, disclosure, and espionage during transport and storage.
ORIZON automatically protects documents stored by users in the Cloud since the files are encrypted, as soon as they are created and in real time, at the source location.
File libraries
PROTECT FILE SHARING
INTERNALLY AND WITH THIRD-PARTY PARTNERS
ZONEPOINT : CONFIDENTIALITY AND PARTITIONING IN MS SHAREPOINT™
Documents are filed, published, shared, in large numbers, every day, on internal MS SharePointTM sites by employees, often without any real control over who actually has access to them.
MS SharePointTM is a solution that is often chosen but, in this use case, its exposure on the web and to third-party partners increases the risk of uncontrolled access to the data. By providing an encryption layer, ZONEPOINT guarantees data confidentiality, and bring a source protection, on the user’s terminal.
Files shares
PROTECT YOUR USER'S EXTENDED ENVIRONMENT AND
SECURE SERVER PARTITIONNING
ZONECENTRAL : Confidentiality and partitioning
For a company, provide a confidentiality service applicable to all of an organisation’s files is essential to guarantee the confidentiality of its sensitive data.
ZONECENTRAL automatically applies the enterprise encryption policy in order to protect all files and sensitive zones on the workstation.
ZONECENTRAL is easy to deploy and free of any organizational constraints. It can suit to suit any type of infrastructure and integrates flexible administration mechanisms.
User environment
SECURE YOUR USER'S ENVIRONMENT
ZONECENTRAL : Confidentiality and partitioning
For a company, provide a confidentiality service applicable to all of an organisation’s files is essential to guarantee the confidentiality of its sensitive data.
ZONECENTRAL automatically applies the enterprise encryption policy in order to protect all files and sensitive zones on the workstation.
ZONECENTRAL is easy to deploy and free of any organizational constraints. It can suit to suit any type of infrastructure and integrates flexible administration mechanisms.