Through Cyber Reliant’s leading-edge encryption and file shredding technology, Cyber Reliant Protect enables users to securely store data on their devices (laptops, handhelds, notebooks, mobile devices) to ensure critical data remains secure in the file system. Cyber Reliant Protect integrates seamlessly and compliments existing security technologies.
Both at rest and runtime.
Only authorized users can access their secured data.
Integrates seamlessly with existing IT infrastructures.
Data is transformed and rendered useless to unauthorized users.
Supports HIPAA and PCI-DSS compliance mandates.
Comprehensive bit-level data protection, beyond full-disk encryption.
Centrally configures and manages keys, user authentication into Cyber Reliant Protect, licensing and data protection configuration settings.
Intercepts specified file types and application data. It then sends them to the encryption engine to be split and saved in a specialized file system.
Managed by the Windows kernel driver or Android FUSE; allows for the storage of encrypted and shredded data.
The Configuration Manager is a web-based application that is delivered as a Virtual Appliance and integrates into Active Directory or LDAP. It enables admins to create Cyber Reliant Protect configurations, save, and generate install packages for Windows and Android.
Learn about our unique process of encryption, data shredding, and secure storage that renders the data completely unusable and unrecoverable to anyone but an authorized user.