Menu

Security Ecosystem / File Access Control

Each encrypted file is in essence its own file system, with its own permissions and security. These files will always remain impenetrable unless you have expressly granted permission to another person to specifically view that file

Infographics OFF
keyencryption-content-2

Only user can access data or grant & revoke permissions

Because the encryption keys stay with the user, we truly offer “Zero-Knowledge” privacy. Since we never have access to your keys, your data is never at risk of being unlocked, stolen or misused, either by internal threats or external attacks. You are the only one who can unlock your data: not a hacker, not our staff, in fact no one. If a user attempts to access files more often than approved, you will be notified immediately. If there are signs of malicious intent, we offer a kill button that will immediately revoke user access to the system. This way you don’t have to worry about an employee going rogue and misusing your valuable data.


keyencryption-content-3

Each file is encrypted individually, giving the user full control over access

Wherever your data is stored, on the cloud, on your laptop, on a USB drive, on a backup disk or on someone else’s computer, only you, and those you authorize, can view the contents of those files. Our system will give you complete peace of mind since it will provide you with a level of unmatched security that makes the traditional methods of securing a file system almost irrelevant.

With Global Data Sentinel, each encrypted file is in essence its own file system, with its own permissions and security. These files will always remain impenetrable unless you have expressly granted permission to another person to specifically view that file.


id-content-3

Easily & quickly disable user access across all devices and networks

Many organizations struggle with the issues of managing security when staff members leave their jobs. Data can be spread across many devices, online file storage systems and backups. Global Data Sentinel provides a single point to revoke access rights across all files, wherever they are stored, even if the data resides on the member of staff’s own personal devices.

Key features & benefits

key-benefits-ID-data

Granular encryption means control over each piece of data, not just directories

key-benefits-ID-levels

Apply appropriate access levels to users

key-benefits-ID-grant

Quickly grant or revoke access

key-benefits-ID-console

Central console for easy access management