+
+

Related Products

  • CYPHER Learning
    451 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • Curtain LogTrace File Activity Monitoring
    4 Ratings
    Visit Website
  • Curtain MonGuard Screen Watermark
    7 Ratings
    Visit Website
  • Google Chrome Enterprise
    2,051 Ratings
    Visit Website
  • Proton Drive
    3,602 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • Carbide
    88 Ratings
    Visit Website
  • Comet Backup
    217 Ratings
    Visit Website

About

Active Cypher simplifies data protection without end-users knowing and ensures hackers can’t read files even when stolen. Active Cypher integrates with Identity and Access Management solutions to provide access and privilege, secure your data, and doesn’t require extra administrative effort. Active Cypher’s Data First solutions: • Encrypts files in the background transparently to the end-user. • Allows users to share files, even outside your enterprise, and maintain control over how they’re used. • Document sharing can be revoked at any time. • Documents are controlled no matter where you store them, no matter where you send them. We turn data breaches from catastrophes to inconveniences. Regulatory reporting is reduced because data has not been compromised, even if your files are stolen.

About

Prevent attacks by locking down all authorized actions and prevent leaked or stolen data from being read. Invisibly, automatically, without fail. SDS helps you focus your endpoint security efforts on what you can positively control instead of chasing the latest malware variant or trying to train your users to be security experts. Shinobi Defense System is a unique integrated portfolio of proven technologies now available for the first time in the USA. SDS invisibly protects against the top 3 hardest and most prevalent endpoint security problems driving business losses. We combine DeepWhite, the strongest whitelist-based protection technology, and Evolution DLP, a seamless and automatic data loss protection solution, into one integrated system that is powered by our patented Active Intercept engine and Shinobi Forensics logging and reporting platform. Invisibly prevents any leaked or stolen files from being read. Zero end user rules or interaction needed.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses looking for a platform to avoid insider mistakes while thwarting ransomware

Audience

Companies seeking a solution to prevent attacks by locking down all authorized actions

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Active Cypher
Founded: 2017
United States
www.activecypher.com

Company Information

Humming Heads
Founded: 1999
Japan
www.hummingheads.co.jp/english/index.html

Alternatives

Alternatives

Imatag

Imatag

IMATAG
Cypher1

Cypher1

SEC Solutions
MyDLP

MyDLP

Comodo Group

Categories

Categories

Data Loss Prevention Features

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

No info available.

Integrations

No info available.
Claim Active Cypher and update features and information
Claim Active Cypher and update features and information
Claim Humming Heads and update features and information
Claim Humming Heads and update features and information