KodeFile-Enterprise

KEY ON DEMAND ENCRYPTION

file_e1

 

EASY ENTERPRISE FILE ENCRYPTION

key_e1

 

SECURE ENTERPRISE KEY SHARING

 

Get started. Register an Enterprise account.

 

 

What is KODE?

KEY ON DEMAND ENCRYPTION

Generates The Keys

Hassle-free! No more creating keys. KodeFile generates a random, secret AES 256-bit encryption key for every file.

Stores The Keys

Worry-free! No more forgetting keys. "Separate the lock from the key" security. You have the files; KodeFile has the keys.

Shares The Keys

Stress-free! No more exchanging keys. Upon request, KodeFile shares the keys with your confidants and decrypts the files.

 

Agents Encrypt Your Files


Invite your work force to join KodeFile and become the encrypting Agents of your Enterprise. Organize Agents into hierarchical Inner-Circles with restricted membership and customizable key settings.

 

Independently Store & Share Files


Your Agents manage, store and share your files, separate of KodeFile. Perfectly complements your Enterprise's existing file management, email and cloud services. KodeFile never possesses your files.

 

ent_diag

 

Enterprise-Owned Keys


During encryption, Agents designate an Enterprise Circle to be the Key Owner of the files. This designation ensures the keys always remain under the Enterprise's ownership and control, regardless of the encrypting Agent.

 

Share Your Keys


Ideal for collaboration, Circle keys are available to all Circle members for decrypting. If necessary, Agents share the keys with members outside the Circle or Enterprise. Agent make a mistake? Unshare the keys.

 

 

Put Your Agents To Work Protecting Your Files

Gain Security

It's not a case of if, but when your Enterprise will be hacked. With a few clicks, encrypt your Enterprise's most critical files.

Gain Expendiency

Safely share sensitive documents. Email encrypted files. Save time and postage. Audit trail: decrypted = delivered.

Gain Control

Store with confidence and utilize your cloud to the fullest. Upload encrypted files. Share or unshare the keys as necessary.

 

Endless Encryption Use Cases Across All Industries

Financial Houses

Store transaction and consumer data. Industry Compliant

Law Firms

Email private contracts and client files. Privilege Compliant

Medical Practices

Upload patient records and lab results. HIPAA Compliant

 
Admin Console

 

Easily Administer Your Keys


New Agent? Add to any Circle and they immediately gain access to keys. No need to individually share keys for past files.

Oversight


Collaborating Agent? Restricted Inner-Circles ensure keys are never shared outside the Circle. Ideal for sensitive group projects.

Security


Rogue Agent? Unshare all the keys ever shared by an Agent. No longer fear your employees stealing or losing encryption keys.