Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Authora's Encrypted Data Gateway Engine, known as "EDGE," is a command-line tool specifically developed for organizations that need to securely transmit significant quantities of data. This solution offers robust protection for critical business information with minimal disruption to current systems. Additionally, EDGE safeguards vast amounts of information residing on servers and backup devices from unauthorized access. Whether handling tape backups, batch FTP transfers, or distributing data to partners, EDGE delivers strong encryption features essential for automated data processing tasks. By integrating EDGE's cryptographic capabilities into their applications and workflows, organizations can effectively manage risk and adhere to compliance requirements. Furthermore, Authora's EDGE adheres to OpenPGP standards, making it a reliable choice for secure data exchange. The application seamlessly incorporates cryptographic functions into existing business processes and operates independently of platform, functioning on both Windows and various UNIX systems, which enhances its versatility and appeal to a broader range of users.

Description

The :Foundation Client is lightweight and operates with minimal system resources, functioning seamlessly in the background while responding to user actions. Users can access the interface to list managed resources, check reports, or, if they have Administrator privileges, manage Users, Service Components, and Organization resources. This client facilitates user interactions by sending secure requests to KODiAC Cloud Services, while also integrating workflows for end-user applications. With the :Foundation Client, users need not worry about the complexities of manual processes such as decryption, re-encryption, and authentication, as it simplifies encryption into a user-friendly experience. Users can easily navigate through the managed items, explore enumerated Version Instances or their Managed Data Archive, restore content, and obtain Usage Reports, all while having the capability to safeguard extensive data sets – all through a consistent set of User Interface controls, accessible to all Users regardless of their organizational role. Additionally, the design ensures that even those with minimal technical knowledge can effectively utilize its features without any steep learning curve, promoting efficiency and ease of use across the board.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Authora

Website

www.authora.com

Vendor Details

Company Name

Definitive Data Security

Website

definisec.io/ssprotect-deployment/

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Alternatives

Encryptik Reviews

Encryptik

Ceptes
StealthDisk Mobile Reviews

StealthDisk Mobile

Security Group Six
Qrator  Reviews

Qrator

Qrator Labs
CloudEye Reviews

CloudEye

Cloudnosys