New product

Orizon is based on tried-and-tested security concepts: no movement of unencrypted documents on the network and in the Cloud; no keys stored in the information system or in the Cloud; all encryption operations carried out on the terminal with the user’s key close to hand.

View the product

Right-to-Know Management

Guaranteeing the confidentiality of user environments and shared spaces in the Cloud

Orizon enables encryption of files and folders stored with Cloud service providers. An enterprise encryption policy can be automatically applied to folders synchronised to the Cloud.

View the product

Ensuring the confidentiality of files on information systems

ZoneCentral offers companies high levels of security by encrypting files. Simple to deploy and with extremely flexible administration mechanisms, it can adapt to suit every type of infrastructure.

  • The company retains control of security governance
  • Confidentiality of data vis-à-vis the operator
  • Encryption of fixed workstations and laptops
View the product

Ensuring the confidentiality of documents on MS SharePoint™

ZonePoint allows companies to manage the confidentiality of their document archives by defining an encryption policy for their document libraries in Microsoft SharePoint.

  • Access via Windows Explorer (Webdav) or web browser
  • Depositing / retrieval of encrypted documents is entirely transparent to the user
  • Authentication via X509 certificate or password
  • Enterprise recovery mechanism
View the product

Perimeter Security

Anti-theft encryption of your laptops

Cryhod is a modern encryption software offering full-disk encryption of all your company’s mobile workstations.

  • Encryption on-the-fly of entire disks and/or partitions (including system partition)
  • Pre-boot authentication (before start-up) with free choice of authentication mode
  • Integrated user recovery and troubleshooting
View the product

Exchanges

Encrypted containers for secure file transport

Use Zed! encrypted containers for protecting your transported files, irrespective of the channel used (email, portable device, file transfer, etc.). The .zed containers are analogous to a «diplomatic bag», containing sensitive files that only the identified recipients are entitled to read.

View the product

ZED! FREE: freeware to read encrypted containers and to answer encrypted way.

Encrypted enterprise messaging

Directly integrated in the enterprise messaging system, ZedMail is a end-to-end encryption solution.

View the product