The growing number of cyberattacks represents "one of the biggest transfers of intellectual knowledge that we have ever seen."

- Admiral Mike Rogers
National Security Agency Director

About Us

We protect your files as if they are our own

Chances are that you haven’t heard about us but we’ve been keeping corporate board papers, government cabinet documents, multi-billion dollar merger & acquisition deals - and other sensitive material - safe for well over a decade now.

We do things quietly and efficiently.

No-one does mobile security like we do, and no-one provides such easy to use document management and collaboration protection as we do.


Configurable Solutions

Our solutions have been refined to provide comprehensive functionality, but we know that one size doesn't fit all. Extensive configuration capabilities allow you the flexibility to tailor the solution to fit your specific business requirements.

We provide document collaboration solutions that satisfy a variety of business requirements where ease of use and security are paramount. Our solutions offer a more manageable means of keeping sensitive documents safe at work, at home and on the move. We address the complexity, security, and process control challenges of encrypted email, digital rights management, and virtual display approaches.


Enterprise Collaboration

Our intuitive interface - with security that is transparent to the user - provides a highly effective means for the management of sensitive documents, be it simple exchanges between users, or complex workflows that ensure compliance with your business processes.

The innovative workflows and logical security controls combine to significantly reduce effort and prevent inadvertent data exposure, making it the ideal solution for protecting the most sensitive information of corporate boards, executive committees, virtual data rooms, and a diversity of business process requirements.

Oh, and did we mention that we lead the industry in securing documents on mobile devices, with a particular focus on the growing use of tablets and smartphones as part of the business process.



Mobile Functionality

The adoption of tablets and smartphones within business processes introduce new concerns and requirements, not only to provide functionality and ensure compliance but also to secure the business information on those devices against theft or loss.

Our solutions provide flexible business process rules that control the viewing and editing of documents as well as appropriate restrictions as to how, and to whom, documents can be forwarded.

We also enable the separation of enterprise-controlled business documents from personal material, which provides a really easy and effective BYOD solution.

In addition to your enterprise-controlled compartment, a separate user-controlled compartment allows the user to secure material from other sources as well to save sensitive notes and photos created on the mobile device. This private compartment remains invisible to other users and includes the ability to arrange documents within a flexible folder structure, to directly import notes and photos, and automatically sync those folders across multiple personal devices.



Mobile Security

Despite common perception, tablets and smartphones remain highly vulnerable to a determined attacker.

Device encryption is compromised because forensic software tools are readily available on the Internet while remote wiping is completely ineffective once mobile and WiFi access has been disabled.

Our technology mitigates all mobile vulnerability issues by providing full protection at all points - in transit, in use, and at rest.

Security Meets Simplicity

Too often, products are built to meet stringent security requirements but place much less emphasis on ease of use – almost always leading to the adoption of shadow IT services that are simple to use but which don't provide secure protection.

Products

Our products provide uncompromising security married with simple and intuitive interfaces that are designed for non-technical users.

iDea
iDea
iDea
iDea
iDea
iDea

Overview

CommandHub® provides comprehensive business process functionality with the highest levels of security for sensitive corporate and government document collaboration.

Built from the ground up to provide maximum protection, it is available for in-house deployment or as a private, cloud-based service. Innovative workflows reduce effort and provide logical security controls to prevent inadvertent exposure.

Read more

Features and Benefits

  • Secure Infrastructure
  • Layered Security
  • BYOD Enabled
  • Comprehensive Workflows
  • Protected PDF Annotations

Overview

BoardHub™ extends the CommandHub functionality with an Agenda function to provide a ‘board pack’ where each document can be viewed individually or the entire Agenda and associated documents downloaded with a single click. The Consent process facilitates the review and approval of documents.

HubVault extends the Agenda experience to iPads or similar devices as well as allowing private or shared annotations.

Read more

Features and Benefits

  • Reduce Agenda Assembly 50%
  • Secure Infrastructure
  • Simple Administration
  • Time Saving Workflows
  • Work online or offline

Overview

DealHub™ extends the CommandHub functionality for Virtual Data Rooms with comprehensive due diligence Q&A tools that are very easy to use yet can be structured to handle complex response team requirements and effectively manage many thousands of questions per day.

Read more

Features and Benefits

  • Aids Due Dilegence
  • Software Security Layers
  • Deal Status Reports
  • Fully Indexed Extract
  • Easy to Use

Overview

DocumentHub™ is positioned for document distribution and business process compliance while retaining the security principles of CommandHub.

Read more

Features and Benefits

  • Security and Convenience
  • Secure Infrastructure
  • Custom Folder Structure
  • Cost Effective
  • Simplified Administration

Overview

HubVault™ is a mobile/end-point App technology that provides an exceedingly secure environment. In addition to standard device encryption, each file within HubVault is encrypted again with a unique key and those encryption keys are themselves protected with a key that has 10 to the power of 77 combinations. Intrusion protection, whether connected or not, is provided by instantly destroying these keys so that they are not recoverable and the documents are protected from even a forensic attack.

In addition to an enterprise controlled compartment with business process rules, HubVault has a separate, and private, user controlled compartment for securing material from other sources as well notes and pictures.

The HubVault technology is seamlessly interfaced with both the CommandHub and DocumentHub products and is available for Android, iOS, and Windows based devices.

Read more

Features and Benefits

  • Unique Encryption Key
  • Multi-layered Security
  • Offline Intrusion Protection
  • Automatic Folder Sync
  • Secure PDF Annotation

Overview

iFortress® is a stand-alone App with enterprise-grade security to protect private notes, files and photos on iPad and iPhone devices

Read more

Features and Benefits

  • Enterprise-grade File Security
  • Protect Notes and Photos
  • Custom Folder Structure
  • Intrusion Protection
  • Simple, Intuitive Interface

"Serious business process functionality, simplicity of use, and unmatched mobile security"