CTech | Kryptos
CTech | Kryptos
PROMOTION FILM
Scroll Down

Kryptos

When cloud storage services became standard for business use, data security became an increasing concern for businesses. It is evident that cloud storage, whether public or private, is not as secure as it may seem. By encrypting your data and adding a layer of protection before synchronizing it with the cloud, you can enhance its security.

However, who will hold the encryption keys? Regardless of the security measures you have in place, you cannot be certain about the whereabouts of your data once someone else gains access to the keys.

KRYPTOS, separates the data stored in platforms like Dropbox, Google Drive, etc., or in your private cloud, from the encryption keys required to access it.

For more information, www.kryptos.com.tr

Contact Us

Use Cases

CTech | Kryptos

EMPLOYEES AND DATA PROTECTION

KRYPTOS does not require any IT expertise.
There is disruption to existing processes and employees are able to continue working eciently, right from day one using KRYPTOS. Hence, you do not need to train your employees in order to use KRYPTOS
CTech | Kryptos

FEATURES

When You Need Data Encryption?

With cloud storage services becoming a standard for business, data security is an increasing concern for enterprises. It’s clear that cloud storages either public or private aren’t exactly as secure as they were made out to be. By encrypting your data, you can add a layer of protection before they synchronize to the cloud. But who will hold the keys? No matter what security measure you have, you can’t be sure where your data will end up when someone else handles the keys. KRYPTOS decouples the data, that is stored either on Dropbox, Google Drive, etc. or on your private cloud, and the encryption keys required to access it.

EU-GDPR Compilance

In order to maintain security and to prevent processing in infringement of this regulation, the controller or processor should evaluate the risks inherent in the processing and implement measures to mitigate those risks, such as encryption.” (EU-GDPR) KRYPTOS makes use of the most secure encryption algorithm, to date. Therefore, KRYPTOS is considered to be an “appropriate technical and organizational encryption measure” to protect personal data according to EU-GDPR.

Process-Oriented Measures EU-GDPR Implementation

With KRYPTOS, you do not need to change much in existing processes. All the data is encryptedconveniently in the background.

Employees And Data Protection

KRYPTOS does not require any IT expertise. There is no disruption to existing processes and employees are able to continue working eciently, right from day one using KRYPTOS. Hence, you do not need to train your employees in order to use KRYPTOS.

Easy For Everyone

There is no disruption to existing processes and employees are able to continue working effciently, right from day one using KRYPTOS. Hence, you do not need to train your employees in order to use KRYPTOS. KRYPTOS does not require any IT expertise There is no disruption to existing processes and employees are able to continue working effciently, right from day one using KRYPTOS Hence, you do not need to train your employees in order to use KRYPTOS.

Multi Cloud

KRYPTOS works via the local folder, managed by the synchronization client of your cloud storage provider. Therefore, it is Cloud-Neutral and seamlessly integrates with any cloud provider.

Transparent End-To-End Encryption

KRYPTOS creates a virtual hard drive that you can work on it as if it were a USB thumb drive that automatically encrypts its contents. This virtual hard drive becomes a proxy for your encrypted data living in the cloud or in a network share and provides a seamless user experience. KRYPTOS encrypts every file you put onto this virtual drive using a unique per-file key, on your device, before it’s synchronized to its final location. Per-file keys are encrypted using your personal key that is stored securely in a PKCS11 Hardware Token. This double encryption scheme utilizing AES and RSA provides the highest level of security for your files.

Collaboration

You can allow a colleague to access your protected files/folders securely, send/receive secure emails and you can even create groups to manage file sharing in larger environments

Multi Cloud

KRYPTOS works via the local folder, managed by the synchronization client of your cloud storage provider. Therefore, it is Cloud-Neutral and seamlessly integrates with any cloud provider.

Outlook Add-In

Outlook users can send and receive secure emails using
KRYPTOS without any knowledge of information security or encryption. KRYPTOS does not change the day-to-day user experience of Outlook. It just adds an ”Encrypt” option to the Outlook ribbon and everything else is handled in the background by KRYPTOS.

Zero Knowledge

On our servers, we only store data that identifies you as a KRYPTOS user and validates your license. All other data is encrypted on your device before it is transferred to our servers.

EnterPrises

Many more features for enterprises; corporate backups using a Golden Token, central user management, policy customizations, auditing, on-premise installations for critical or regulated environments

CTech | Kryptos

TECHNICAL SPECIFICATIONS

SPECIFICATIONSBASIC PLANPREMIUM PLANENTERPRISE PLAN
Hybrid Encryption AES/RSA
Operating System (Windows, MacOSX, Android, iOS)
Transparent End-to-End Encryption
Virtual Disk
FIPS 140-2 Level 3 Certified PKCS11 Hardware Token
Zero Knowledge
Cloud Service
E-mail Encryption
Collaboration
Key Management
User Management
Policy Management
On Premise

 

CTech | Kryptos
OUTLOOK ADD-IN

Outlook users can send and receive secure emails using KRYPTOS without any knowledge of information security or encryption. KRYPTOS does not change the day-to-day user experience of Outlook. It just adds an ”Encrypt” option to the Outlook ribbon and everything else is handled in the background by KRYPTOS.

CTech | Kryptos
MULTI-CLOUD

KRYPTOS works via the local folder managed by the synchronization client of your cloud storage provider. Therefore, it is cloud-agnostic and seamlessly integrates with any cloud provider.

CTech | Kryptos
ZERO KNOWLEDGE

On our servers, we only store data that identifes you as a KRYPTOS user and validates your license. All other data is encrypted on your device before it is transferred to our servers.

CTech | Kryptos
COLLABORATION

You can allow a colleague to access your protected files/folders securely, send/receive secure
emails and you can even create groups to manage file sharing in larger environments.