Filling the cybersecurity gaps

Filling the cybersecurity gaps

SecureAge Security Suite presents a complete and timely solution for day-to-day enterprise security needs. Amid under reported data breaches and a new operating environment that makes hacking easier, this software will give you the confidence to race to launch new initiatives, speak to new audiences, and differentiate yourself through innovation, while knowing ALL of your Data is safe.

This is evidenced by a 17-year history of ZERO Data breaches for organisations of all sizes. This is achieved via a first-of-it’s-kind ability to protect ALL Data whether it’s in storage, in use, or in transit.

wave

What makes the SecureAge Security Suite different?

SecureData
The SecureAge Security Suite is designed to harness the power of our SecureData technology and more. With SecureData included, you can rely on:
wave
Proactive Data security with pervasive PKI-based encryption technology

The SecureAge Security Suite achieves 100% encryption across every file, every place and every time. With PKI-based encryption we can finally move away from security silos to comprehensive Data protection without any gaps.

wave
Security against unknown threats with intuitive application binding

For threats that fall outside the 99% detection rate of the best malware detectors, the SecureAge Security Suite will deny-by-default ensuring only authorised applications are able to access specific Data for specific purposes. Competitive approaches only stop known threats.

wave
Simple and user-friendly protection with non-intrusive security processes

There’s no disruption to the way people work, it’s performed as usual. The process of decrypting and encrypting happens behind the scenes and no one has to decide what to encrypt - ALL Data is protected.

Other enterprise security features

  • SecureEmail
    Invisible and non intrusive key management for email
    SecureEmail

    Policy-based controls determine how email is sent, stored, forwarded or replied to

    Unlimited key histories to make archived email accessible

    Seamless plugins for common email tools including Microsoft Outlook and IBM Notes

    Allows for user-defined algorithms

    Encrypting email should be easy as sending email - intuitive and accessible to everyone. Using our proven encryption technology you can ensure authenticity and privacy without the need for any training, and without changing the way your team sends and receives email.

  • SecureDisk
    Flexible full-disk encryption for authorised users
    SecureDisk

    Easy to create and mount virtual disks on all Windows platforms

    Simply drag and drop to encrypt and decrypt shared files

    Authenticate and control with digital signing for added security 

    Flexibly manage multiple volumes at preferred sizes 

    This feature creates and manages virtual disks with volume encryption on any Windows laptop, desktop, network server, or storage device. ALL files stored in the secure disk volume are encrypted and fully protected while remaining entirely hidden from view. With SecureDisk you get all the benefits of Full Disk Encryption (FDE) but with the flexibility of multiple volumes at your preferred sizes.

  • DRM and digital signing
    For privacy, integrity and authenticity
    DRM and Digital Signing

    Securely sign documents so recipients can be assured they are from the original sender

    Permanently delete confidential documents without leaving a trace

    Built-in key and signature management

    This is a comprehensive PKI-based feature that secures ALL files with 256-bit AES (Advanced Encryption Standard) file encryption, digital signing and digital rights management (DRM). ALL files are protected from unwanted tampering and interception ensuring privacy, integrity, and authenticity.

SecureEmail

Policy-based controls determine how email is sent, stored, forwarded or replied to

Unlimited key histories to make archived email accessible

Seamless plugins for common email tools including Microsoft Outlook and IBM Notes

Allows for user-defined algorithms

Encrypting email should be easy as sending email - intuitive and accessible to everyone. Using our proven encryption technology you can ensure authenticity and privacy without the need for any training, and without changing the way your team sends and receives email.

SecureDisk

Easy to create and mount virtual disks on all Windows platforms

Simply drag and drop to encrypt and decrypt shared files

Authenticate and control with digital signing for added security 

Flexibly manage multiple volumes at preferred sizes 

This feature creates and manages virtual disks with volume encryption on any Windows laptop, desktop, network server, or storage device. ALL files stored in the secure disk volume are encrypted and fully protected while remaining entirely hidden from view. With SecureDisk you get all the benefits of Full Disk Encryption (FDE) but with the flexibility of multiple volumes at your preferred sizes.

DRM and Digital Signing

Securely sign documents so recipients can be assured they are from the original sender

Permanently delete confidential documents without leaving a trace

Built-in key and signature management

This is a comprehensive PKI-based feature that secures ALL files with 256-bit AES (Advanced Encryption Standard) file encryption, digital signing and digital rights management (DRM). ALL files are protected from unwanted tampering and interception ensuring privacy, integrity, and authenticity.

Manage your endpoints with a centralised dashboard

  • For large enterprises, it’s not enough to merely secure a file, it also needs to be centrally controlled, governed by audit logs, and protected by key management. That’s what the Security Management Server (SMS) feature is for.
    Security policies
    Security policies

    Not every endpoint needs the same level of security so with the SMS you can configure how the SecureAge Security Suite runs from an on-premise central admin console. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

    Audit logs
    Audit logs

    With the SMS you can keep a record of all security events on your endpoints and allow administrators immediate access to the logs via an on-premise admin console for further insight. This includes forensic analysis, and historical trace.

    Users and roles
    Users and roles

    With the SMS you can create multiple users and groups with varying security access rights. This ensures only your security management team has access to the on-premise central admin console.

    Certificates and keys
    Certificates and keys

    The creation, management and revocation of encryption keys and digital certificates can be a tedious and time consuming task. With SMS this process becomes easier for organisations to manage.

For large enterprises, it’s not enough to merely secure a file, it also needs to be centrally controlled, governed by audit logs, and protected by key management. That’s what the Security Management Server (SMS) feature is for.
  • Security policies
    Security policies
    Security policies

    Not every endpoint needs the same level of security so with the SMS you can configure how the SecureAge Security Suite runs from an on-premise central admin console. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

  • Audit logs
    Audit logs
    Audit logs

    With the SMS you can keep a record of all security events on your endpoints and allow administrators immediate access to the logs via an on-premise admin console for further insight. This includes forensic analysis, and historical trace.

  • Users and roles
    Users and roles
    Users and roles

    With the SMS you can create multiple users and groups with varying security access rights. This ensures only your security management team has access to the on-premise central admin console.

  • Certificates and keys
    Certificates and keys
    Certificates and keys

    The creation, management and revocation of encryption keys and digital certificates can be a tedious and time consuming task. With SMS this process becomes easier for organisations to manage.

Security policies
Security policies

Not every endpoint needs the same level of security so with the SMS you can configure how the SecureAge Security Suite runs from an on-premise central admin console. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

Audit logs
Audit logs

With the SMS you can keep a record of all security events on your endpoints and allow administrators immediate access to the logs via an on-premise admin console for further insight. This includes forensic analysis, and historical trace.

Users and roles
Users and roles

With the SMS you can create multiple users and groups with varying security access rights. This ensures only your security management team has access to the on-premise central admin console.

Certificates and keys
Certificates and keys

The creation, management and revocation of encryption keys and digital certificates can be a tedious and time consuming task. With SMS this process becomes easier for organisations to manage.

Store encrypted files safely in the cloud

Drop, share, keep, backup, and repeat.

Our technology can continue to encrypt folders that you move to the cloud, including GSuite, Office 365, DropBox, and OneDrive.It provides a convenient repository for all file formats, including Microsoft doc, zipped files, pdf, videos, photos, and music, making it a flexible security solution for companies who want to ensure their Data lives safely from prying eyes while still being accessible anywhere, anytime, and from any device.

Frequently asked questions about
our enterprise security software

What are the system requirements for SecureAge Security Suite?

SecureAge Security Suite works on all Windows platforms and will soon be available on Linux and Mac platforms. Contact us for more information on the status of Linux and Mac compatibility.

What are the costs associated wth SecureAge Security Suite?

SecureAge Security Suite is licensed per-endpoint, with either a subscription-based or perpetual license option. 

We offer training, consultancy and maintenance services to ensure a smooth deployment and on-going operations support.

When using SecureAge Security Suite, who can access what and where?

With SecureAge Security Suite there is no access to any file without the SecureAge agent. The pervasive encryption and application binding prevents the product from being disabled by a malicious actor. In addition, our AI-powered endpoint protection solution (SecureAPlus) is linked to our PKI-based encryption functionality in a way that if it is ever disabled, no files would be accessible.

For further security, online and offline policy controls can be added for different individuals or groups of users. “Online” means that the end-user is connected to the Security Management Server (SMS) (within the network) and “Offline” means that they’re not. With detailed logging functionality, the SMS collects logs from itself and from all endpoints. If the SMS is unavailable for a defined period of time (e.g. when the user is offline) logs are maintained by the client for 2 days by default.

How does the SecureAge Security Suite exchange encrypted email externally?

The SecureEmail feature allows users to exchange encrypted emails with other people outside of the organization (i.e. those that do not have the SecureAge Security Suite). When using this feature the body text of the email will appear as a PDF document (password protected via a one-time-password to view) and attached to the email. These attachments are embedded to ensure 100% privacy. 

SecureEmail works with S/MIME which is a widely accepted e-mail protocol that is supported by most commonly used email providers such as outlook and apple mail. S/MIME is an important Simple Mail Transfer Protocol (SMTP) which allows for widespread and secure email connectivity.

How does SecureAge Security Suite strengthen security of third party applications?

Application Binding can be used to create a data sandbox which prevents advanced persistent threats. It combats these threats by allowing you to set your own special rules as to which circumstances a file should be decrypted / encrypted thereby ensuring files are only opened by certain applications (eg: only Microsoft Word can open .doc files). This prevents reading / editing of files from any other application such as Adobe Reader) 

This is useful for high risk applications such as web browsers. For instance, if Internet Explorer is attacked or compromised, only those path directories accessible to Internet Explorer will be affected, all other user systems and Data remain intact.

How does the SecureAge Security Suite handle two-factor authentication?

SecureAge Security Suite is designed to support any form of multi-factor authentication. This includes seamless integration with passwords and key cards or USB tokens. It is interoperable with all PKCS#11 based secure devices including Smart Cards, Security Tokens, or Hardware Security Modules (HSM).

How does the SecureAge Security Suite protect my Data on SharePoint?

For enterprises that use SharePoint Server for collaboration among team members, our SecureData technology automatically protects all files that are dragged and dropped into the SharePoint server. This means, only authorised collaborators with the right key are able to access, read, and edit the information contained within SharePoint. This limits  involvement by the users and it protects unauthorised insiders or unwanted external sniffers from stealing any information.

Further mitigating the risk of Data leakage is the Data access audit logs which capture details about every file accessed on SharePoint including movement of files out of SharePoint. This Data log helps administrators identify the cause of any anomalies.

wave wave wave wave wave

See our enterprise security software in action

We use cookies to improve your experience, for analytics and marketing. By continuing to browse our website, we assume you’re ok with this. To find out more about our use of cookies, please see our Cookie Policy.