Filling the cybersecurity gaps

Filling the cybersecurity gaps

The SecureAge Security Suite offers a complete and timely solution for everyday enterprise security needs.

Amid under reported Data breaches, and a new operating environment that makes hacking easier, this software will give you the confidence to race to launch new initiatives, speak to new audiences, and differentiate yourself through innovation, while knowing ALL of your Data is safe.

This is evidenced by an 18-year history of ZERO Data breaches for organisations of all sizes, and a first-of-it’s-kind ability to protect ALL Data whether it’s in-storage, in-use, or in-transit. 

wave

What makes the SecureAge Security Suite different?

Comprehensive Data protection without the trade-offs
Through time-tested technology and design, the SecureAge Security Suite achieves Data protection with a careful balance of the known in proactive Data security and real-world usability and the unknown in application binding. Our approach ensures that there aren’t any trade-offs among these three equally important elements.
wave
Proactive Data security with pervasive and persistent PKI-based encryption

The SecureAge Security Suite achieves 100% protection across every file, every place and every time. With PKI-based encryption we can finally move away from security silos to comprehensive Data protection without any gaps.

wave
Real-world usability with a simplified approach that is inherent and invisible
The SecureAge Security Suite removes the human element rather than trying to account for or change it. We don’t try to force everyone to become a cybersecurity expert and we allow people to work as they normally do without sacrificing security.
wave
Security against unknown threats with intuitive application binding
The SecureAge Security Suite ensures your applications work the way you expect them to and only access specific Data for specific purposes. While our technology ensures that any leaked Data is useless, we like to eliminate surprises and keep your Data where it belongs.

Other enterprise security features

  • SecureEmail
    Invisible and non-intrusive key management for email
    SecureEmail Watch the video

    Policy-based controls determine how email is sent, stored, forwarded or replied to

    Unlimited key history to make archived email accessible

    Seamless plugins for common email tools including Microsoft Outlook and HCL Notes

    User-defined algorithms

    Encrypting email should be easy as sending email - intuitive and accessible to everyone. Using our proven encryption technology you can ensure authenticity and privacy without the need for any training, and without changing the way your team sends and receives email.

  • SecureDisk
    Flexible full-disk encryption for authorised users
    SecureDisk Watch the video

    Easy to create and mount virtual disks on all Windows platforms

    Simply drag and drop to encrypt and decrypt shared files

    Authenticate and control with digital signing for added security 

    Flexibly manage multiple volumes at preferred sizes 

    This feature creates and manages virtual disks with volume encryption on any Windows laptop, desktop, network server, or storage device. ALL files stored in the secure disk volume are encrypted and fully protected while remaining entirely hidden from view. With SecureDisk you get all the benefits of Full Disk Encryption (FDE) but with the flexibility of multiple volumes at your preferred sizes.

  • DRM and digital signing
    For privacy, integrity and authenticity
    DRM and Digital Signing Watch the video

    Securely sign documents so recipients are assured they’re from the original sender

    Permanently delete documents without leaving a trace

    Built-in key and signature management

    This is a comprehensive PKI-based feature that secures ALL files with 256-bit AES (Advanced Encryption Standard) file encryption, digital signing and digital rights management. ALL files are protected from unwanted tampering and interception ensuring privacy, integrity, and authenticity.

SecureEmail Watch the video

Policy-based controls determine how email is sent, stored, forwarded or replied to

Unlimited key history to make archived email accessible

Seamless plugins for common email tools including Microsoft Outlook and HCL Notes

User-defined algorithms

Encrypting email should be easy as sending email - intuitive and accessible to everyone. Using our proven encryption technology you can ensure authenticity and privacy without the need for any training, and without changing the way your team sends and receives email.

SecureDisk Watch the video

Easy to create and mount virtual disks on all Windows platforms

Simply drag and drop to encrypt and decrypt shared files

Authenticate and control with digital signing for added security 

Flexibly manage multiple volumes at preferred sizes 

This feature creates and manages virtual disks with volume encryption on any Windows laptop, desktop, network server, or storage device. ALL files stored in the secure disk volume are encrypted and fully protected while remaining entirely hidden from view. With SecureDisk you get all the benefits of Full Disk Encryption (FDE) but with the flexibility of multiple volumes at your preferred sizes.

DRM and Digital Signing Watch the video

Securely sign documents so recipients are assured they’re from the original sender

Permanently delete documents without leaving a trace

Built-in key and signature management

This is a comprehensive PKI-based feature that secures ALL files with 256-bit AES (Advanced Encryption Standard) file encryption, digital signing and digital rights management. ALL files are protected from unwanted tampering and interception ensuring privacy, integrity, and authenticity.

loading...
loading...
loading...

Manage your endpoints with a centralised dashboard

  • For large enterprises, it’s not enough to merely secure a file, it also needs to be centrally controlled, governed by audit logs, and protected by key management. That’s what our Security Management Server is for.
    Security policies
    Security policies

    Not every endpoint needs the same level of security so with the Security Management Server you can configure how the SecureAge Security Suite runs from an on-premise central admin console. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

    Audit logs
    Audit logs

    With the Security Management Server you can keep a record of all security events on your endpoints and allow administrators immediate access to the logs via an on-premise admin console for further insight. This includes forensic analysis, and historical trace.

    Users and roles
    Users and roles

    The Security Management Server allows you to create multiple users and groups with varying security access rights. This ensures only your security management team has access to the on-premise central admin console.

    Certificates and keys
    Certificates and keys

    The creation, management and revocation of encryption keys and digital certificates can be a tedious and time consuming task. With the Security Management Server this process becomes easier for organisations to manage.

For large enterprises, it’s not enough to merely secure a file, it also needs to be centrally controlled, governed by audit logs, and protected by key management. That’s what our Security Management Server is for.
  • Security policies
    Security policies
    Security policies

    Not every endpoint needs the same level of security so with the Security Management Server you can configure how the SecureAge Security Suite runs from an on-premise central admin console. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

  • Audit logs
    Audit logs
    Audit logs

    With the Security Management Server you can keep a record of all security events on your endpoints and allow administrators immediate access to the logs via an on-premise admin console for further insight. This includes forensic analysis, and historical trace.

  • Users and roles
    Users and roles
    Users and roles

    The Security Management Server allows you to create multiple users and groups with varying security access rights. This ensures only your security management team has access to the on-premise central admin console.

  • Certificates and keys
    Certificates and keys
    Certificates and keys

    The creation, management and revocation of encryption keys and digital certificates can be a tedious and time consuming task. With the Security Management Server this process becomes easier for organisations to manage.

Security policies
Security policies

Not every endpoint needs the same level of security so with the Security Management Server you can configure how the SecureAge Security Suite runs from an on-premise central admin console. For instance, you can create a policy as a default for your entire organisation, create a tighter one for R&D or finance, and set a flexible one for your marketing team.

Audit logs
Audit logs

With the Security Management Server you can keep a record of all security events on your endpoints and allow administrators immediate access to the logs via an on-premise admin console for further insight. This includes forensic analysis, and historical trace.

Users and roles
Users and roles

The Security Management Server allows you to create multiple users and groups with varying security access rights. This ensures only your security management team has access to the on-premise central admin console.

Certificates and keys
Certificates and keys

The creation, management and revocation of encryption keys and digital certificates can be a tedious and time consuming task. With the Security Management Server this process becomes easier for organisations to manage.

Store encrypted files safely in the cloud

Securely drop, share, store, and manipulate. Maintain control of your Data in the cloud in one seamless environment.

Our technology provides persistent and pervasive protection for all files you move into the cloud: GSuite, Office 365, DropBox, OneDrive, and more. ‘All files’ really means everything (e.g. Microsoft documents, videos, photos, design files, software code) that you want to ensure is protected, even from cloud vendors and other threats you can’t even imagine.

Frequently asked questions about
our enterprise security software

What are the system requirements for the SecureAge Security Suite?

The SecureAge Security Suite works on all Windows platforms and will soon be available on Linux and Mac platforms. Contact us for more information on the status of Linux and Mac compatibility.

What are the costs associated with the SecureAge Security Suite?

The SecureAge Security Suite is licensed per-endpoint, with either a subscription-based or perpetual license option. 

We offer training, consultancy and maintenance services to ensure a smooth deployment and on-going operations support.

When using the SecureAge Security Suite, who can access what and where?

With the SecureAge Security Suite there is no access to any file without the SecureAge agent. The pervasive encryption and application binding prevents the product from being disabled by a malicious actor. In addition, our AI-powered endpoint protection solution (SecureAPlus) is linked to our PKI-based encryption functionality. That means if it is ever disabled, no files would be accessible.

For further security, online and offline policy controls can be added for different individuals or groups of users. “Online” means that the end-user is connected to the Security Management Server (within the network) and “Offline” means that they’re not. With detailed logging functionality, the Security Management Server collects logs from itself and from all endpoints. If the Security Management Server is unavailable for a defined period of time (e.g. when the user is offline) logs are maintained by the client for 2 days by default.

How does the SecureAge Security Suite exchange encrypted email externally?

The SecureEmail feature allows users to exchange encrypted emails with other people outside of the organization (i.e. those that do not have the SecureAge Security Suite). When using this feature the entire email body and any attachment will be encrypted to ensure 100% privacy. Recipients will be prompted to verify their email address in order to obtain the password to decrypt.

SecureEmail works with S/MIME which is a widely accepted e-mail protocol that is supported by most commonly used email providers such as outlook and apple mail. S/MIME is an important Simple Mail Transfer Protocol (SMTP) which allows for widespread and secure email connectivity.

How is SecureAge Security Suite email different from Microsoft Office 365 options?
SecureEmail works independently of any centralised server and decrypts emails with the recipient’s private key at the end-point. SecureEmail also has the option to generate a one-time password requiring recipients to validate their identity before accessing.

Email encryption features are available through Microsoft Office 365 if users have E3 subscriptions and above and can configure their settings through Azure Information Protection. When signed in, recipients can receive encrypted messages with Office 365 Message Encryption (OME) which decrypts in the Microsoft server with the recipient’s private key that is stored there. OME also has the option to generate a one-time password requiring recipients to validate their identity before accessing.

Read how our technology avoids the gaps in server based processing and authenticates each file for each user at the end point.
How does SecureAge Security Suite strengthen security of third party applications?

Application Binding can be used to create a Data sandbox which prevents advanced persistent threats. It combats these threats by allowing you to set your own special rules as to which circumstances a file should be decrypted / encrypted thereby ensuring files are only opened by certain applications (eg: only Microsoft Word can open .doc files). This prevents reading / editing of files from any other application such as Adobe Reader).

This is useful for high risk applications such as web browsers. For instance, if Internet Explorer is attacked or compromised, only those path directories accessible to Internet Explorer will be affected, all other user systems and Data remain intact.

How does the SecureAge Security Suite handle two-factor authentication?

The SecureAge Security Suite is designed to support any form of multi-factor authentication. This includes seamless integration with passwords and key cards or USB tokens. It is interoperable with all PKCS#11 based secure devices including Smart Cards, Security Tokens, or Hardware Security Modules (HSM).

How does the SecureAge Security Suite protect my Data on SharePoint?

For enterprises that use SharePoint Server for collaboration among team members, our SecureData technology automatically protects all files that are dragged and dropped into the SharePoint server. This means, only authorised collaborators with the right key are able to access, read, and edit the information contained within SharePoint. This limits  involvement by the users and it protects unauthorised insiders or unwanted external sniffers from stealing any information.

Further mitigating the risk of Data leakage is the Data access audit logs which capture details about every file accessed on SharePoint including movement of files out of SharePoint. This Data log helps administrators identify the cause of any anomalies.

wave wave wave wave wave

See our enterprise security software in action

We use cookies to improve our website experience and assume that by continuing to browse, you’re OK with it. To find our more about how we use cookies, please see our Cookie Policy.