"We are in a world now where, despite your best efforts, you must prepare and assume you will be penetrated."
"It is not about if you will be penetrated, but when."
Chances are that you haven’t heard about us but we’ve been keeping corporate board papers, government cabinet documents, multi-billion dollar merger & acquisition deals - and other sensitive material - safe for well over a decade now.
We do things quietly and efficiently.
No-one does mobile security like we do, and no-one provides such easy to use document management and collaboration protection as we do.
Our solutions have been refined to provide comprehensive functionality, but we know that one size doesn't fit all. Extensive configuration capabilities allow you the flexibility to tailor the solution to fit your specific business requirements.
We provide document management and collaboration solutions that satisfy a variety of business requirements where ease of use and security are paramount. Our solutions offer a more manageable means of keeping sensitive documents safe at work, at home and on the move. We address the complexity, security, and process control challenges of encrypted email, digital rights management, and virtual display approaches.
Our intuitive interface - with security that is transparent to the user - provides a highly effective means for the management of sensitive documents, be it simple exchanges between users, or complex workflows that ensure compliance with your business processes.
The innovative workflows and logical security controls combine to significantly reduce effort and prevent inadvertent data exposure, making it the ideal solution for protecting the most sensitive information of corporate boards, executive committees, virtual data rooms, and a diversity of business process requirements.
Oh, and did we mention that we lead the industry in securing documents on mobile devices, with a particular focus on the growing use of tablets and smartphones as part of the business process.
The adoption of tablets and smartphones within business processes introduce new concerns and requirements, not only to provide functionality and ensure compliance but also to secure the business information on those devices against theft or loss.
Our solutions provide flexible business process rules that control the viewing and editing of documents as well as appropriate restrictions as to how, and to whom, documents can be forwarded.
We also enable the separation of enterprise-controlled business documents from personal material, which provides a really easy and effective BYOD solution.
In addition to your enterprise-controlled compartment, a separate user-controlled compartment allows the user to secure material from other sources as well to save sensitive notes and photos created on the mobile device. This private compartment remains invisible to other users and includes the ability to arrange documents within a flexible folder structure, to directly import notes and photos, and automatically sync those folders across multiple personal devices.
Despite common perception, tablets and smartphones remain highly vulnerable to a determined attacker.
Device encryption is compromised because forensic software tools are readily available on the Internet while remote wiping is completely ineffective once mobile and WiFi access has been disabled.
Our technology mitigates all mobile vulnerability issues by providing full protection at all points - in transit, in use, and at rest.
Too often, products are built to meet stringent security requirements but place much less emphasis on ease of use – almost always leading to the adoption of shadow IT services that are simple to use but which don't provide secure protection.
Our products provide uncompromising security married with simple and intuitive interfaces that are designed for non-technical users.
CommandHub® provides the highest levels of security for sensitive document distribution.
Built from the ground up to deliver maximum protection, CommandHub is provided as a private-cloud managed service as well as being available for on-premises deployment.Read more
CommandHub Pro extends the CommandHub features with comprehensive business process functionality for sensitive corporate and government document management and collaboration.
Innovative workflows reduce effort and provide logical security controls to ensure process compliance and prevent inadvertent exposure.Read more
BoardHub™ extends the CommandHub Pro functionality with an Agenda function to provide a ‘board pack’ where each document can be viewed individually or the entire Agenda and associated documents downloaded with a single click. The Consent process facilitates the review and approval of documents.
HubVault extends the Agenda experience to iPads or similar devices as well as allowing private or shared annotations.Read more
DealHub™ extends the CommandHub Pro functionality for Virtual Data Rooms with comprehensive due diligence Q&A tools that are very easy to use yet can be structured to handle complex response team requirements and effectively manage many thousands of questions per day.Read more
HubVault™ is a mobile/end-point technology that provides an exceedingly secure environment. In addition to standard device encryption, each file within HubVault is encrypted again with a unique key and those encryption keys are themselves protected with a key that has 10 to the power of 77 combinations. Intrusion protection, whether connected or not, is provided so that documents are protected from even a forensic attack.
In addition to an enterprise controlled compartment with business process rules, HubVault has a separate, and private, user controlled compartment for securing material from other sources as well as notes and pictures.
The HubVault technology is seamlessly integrated within both the CommandHub and CommandHub Pro products and is available for Android, iOS (Apple), and Windows based devices.Read more
iFortress® is a stand-alone App with enterprise-grade security to protect private notes, files and photos on iPad and iPhone devicesRead more