Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
FileOpen's digital rights management (DRM) solution functions as an intermediary control layer within widely accepted formats and applications. This system features tools for document encryption, client-side decryption software compatible with the most prevalent viewer applications, and server software that employs a publicly published control protocol, which can also be integrated into custom solutions. Utilizing encryption techniques that adhere to industry standards, FileOpen applies the methods stipulated in the relevant format specifications. For instance, in the case of PDFs, it employs AES-256 to ensure compatibility with PDF (ISO 32000) 2.0 and RC4-128 for support of earlier PDF versions. When it comes to Microsoft Office files, AES is utilized as implemented by Microsoft through the add-in API layer. Documents encrypted through FileOpen can only be accessed under the conditions specified by the publisher's PermissionServer, which may allow various combinations of permissions such as printing, editing, copying, annotating, signing, saving changes, and applying additional controls. This level of control ensures that publishers maintain robust oversight over how their documents are utilized and shared.
Description
StealthDisk Mobile leverages Virtual Disk Technology to securely and effortlessly manage your essential files and documents. By employing top-tier encryption algorithms, it generates an encrypted virtual disk that seamlessly encrypts and decrypts your data as you work. Once you finish your tasks, simply dismount the StealthDisk volume, and all your significant files and documents become instantly concealed and encrypted. Unlike other file encryption tools that require you to encrypt each file or folder individually, StealthDisk Mobile simplifies the process. Its algorithms are not only optimized for efficiency but also operate at remarkable speeds. The software handles data on-the-fly, ensuring that decryption occurs only when data is accessed, rather than requiring the entire file to be processed upfront. This means you can work more efficiently, as StealthDisk Mobile automates encryption and decryption for the specific data you engage with, ultimately conserving both time and system resources. With StealthDisk Mobile, you can enjoy peace of mind knowing your files are protected without the hassle of manual encryption steps.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
$3000.00/year
Free Trial
Free Version
Pricing Details
$49.95 one-time payment
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
FileOpen Systems
Country
United States
Website
www.fileopen.com/technology-overview
Vendor Details
Company Name
Security Group Six
Website
www.sgsix.com
Product Features
Document Management
Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control
Product Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning