How does Keyavi uniquely protect your critical data

Protecting a file with Keyavi is a non-destructive process to the original document.

  1. The first step of the protection process places the document into an “.IKD” (Intelligent Keyavi Data) file — you can think of this as a protective wrapper.
  2. Next, we infuse the .IKD file with a micro-database and policies, adding a very norminal increase in file size.
  3. The last step in the process encrypts the .IKD file with multiple interlocking encryption keys. The default encryptions algorithm is AES 256, which can be changed by your organization if required. No encryption keys are stored in the file and Keyavi-protected files are automatically opened with the native application used to create the original document.
Enhance any file with IKD micro database and policies

Harness the full power of Keyavi’s self-protecting data solution.

Keyavi Portal

An administrative web portal for data owners to monitor and manage their protected .IKD files. It also provides comprehensive platform controls for user, policy, and security administrators.

Demo

User Dashboard

Hover over a card to learn about its contents

Weekly Access Snapshot

weekly snapshot
  • Authorized Access
  • Policy Violations
  • Unauthorized Attempts

The Weekly Access Snapshot shows the trends in attempts to access the data over the past seven days.

  • Authorized Access Attempts, shown in green, are successful attempts to open files by authorized users.
  • Policy Violations, shown in yellow, are the number of attempts by an authorized party opening your organizations’ files but violates one or more policy conditions set by the file owner (like geolocations or time limitations).
  • Unauthorized Access Attempts appear in red, and happen when an unauthorized party attempts to open the file.

Today’s Access Snapshot

daily snapshot
  • Authorized Access
  • Policy Violations
  • Unauthorized Attempts

Today’s Access Snapshot shows the breakdown of access attempts and potential policy violations in the last 24 hours.

Pending Access Requests

No Requests

Grant or deny access requests submitted by users who want to access secured files. Users are only able to see pending requests for the files they have secured and shared.

Weekly Policy Violations

weekly-policy-violations
  • Geolocation

A weekly view of policy violations, including access attempts from users outside of an authorized geolocation or time access policy.

Weekly Access Locations

+
keyavi map

View all access attempts for your data from around the globe. Each pin can reveal the location and time of an Access event and whether access was granted or denied.

Data Management

Click on the top item to view data controls and records

Name File Type Date Created Is Recalled Recalled Date
Private_Webinar.mp4 .mp4 11/26/2022 01:12 PM true 11/29/2022 08:05 AM
Company_Pii.csv .csv 10/19/2022 02:02 PM false
New_Chip_Schematics.pdf .pdf 10/04/2022 03:21 PM false
Crown_Jewels.zip .zip 09/12/2022 07:00 AM true 09/21/2022 01:45 PM
Proprietary_Class.cpp .cpp 09/01/2022 03:22 PM false
Health_Insurance.json .json 08/26/2022 09:09 AM false
Vulnerabilities.docx .docx 08/13/2022 11:04 AM true 08/25/2022 09:47 AM
Profiles.ppt .ppt 07/29/2022 02:56 PM false
Passwords.csv .csv 06/16/2022 04:45 PM false
Evidence.jpg .jpg 05/20/2022 08:15 AM false
Contract.pdf .pdf 04/06/2022 03:24 PM false
1 15 1 – 12 of 12 items

As a data owner, you will use the Data Management Console to recall files, modify access, add users, and add policy requirements on all the protected data you’ve created.

Click to see details, modify access, add users, or update policy requirements.

Data Management Detail Financial_Projection.xslx

Click on any card to go back to Data Management List

Access Authorization

Authorized User/Group Email Access Type Revoked
Hobbs, Daniella [email protected] Full Access false
Emarq, Mark [email protected] Read-Only true
Danson, Dan [email protected] Read-Only false
1
Update access for users, add user authorization, or recall access to the file for all authorized users.

Access Time (shown in EST)

Access Start Time

Date Time  

Access End Time

Date Time  
Add or update date and time embargos for your protected files.

Chain of Custody Events

User Date/Time (UTC) Action Event
Webb, Jill 01/24/2023 5:30 AM ENCRYPT SUCCESS
1
Understand how, when, and by who your data is being accessed by throughout the entirety of the protected files’ lifecycle.

Policy Audit Trail

User Action Date (UTC) Modification
Webb, Jill Changed 01/24/2023 12:00 PM Access Window
Webb, Jill Created 01/26/2023 11:00 AM Authorized Group Access
Webb, Jill Changed 02/04/2023 11:00 AM Authorized Group Access
1
Review every change made to user access or policies for each of your protected files.

Keyavi Desktop

A full-featured, user-friendly and intuitive Windows desktop solution that give users easy, secure, and complete control over their .IKD-protected files.

Mobile App

iOS and Android apps enable users to maintain complete control of their secured Keyavi data files on the go. You can protect files and provision access from anywhere!

Keyavi Web

Since not all users can download and install Keyavi’s technology onto their desktop, this free, browser-based web client lets users open and view .IKD files. This functionality incorporates most of the features of Keyavi’s desktop application.

Keyavi Lite

A paired-down version of Keyavi’s full desktop application that lets internal and external users open protected .IKD files in read-only mode. This free Windows app is available for download from the Microsoft store.

Keyavi Services Diagram
The Keyavi Service Node can be installed on premise or in the cloud

The Keyavi Service Node

The service Node is the core of the Keyavi platform. It is a RESTful API-based web service that can be installed on premise or in the cloud. The node provides management, policy and the encryption needed to protect files.

Keyavi Node server components
Inside a Keyavi Node web server