Why You Need this

Self-protecting data empowers you to rethink your security architecture, risk models, governance policies, and tool spending while simultaneously combating data theft and mitigating the impact of sophisticated ransomware

Security

With Keyavi, data is protected by a multilayered AES 256-bit encryption and rotating keys, forming a micro-container around data itself. Keyavi protected files use role-based controls to determine accessibility. This includes policies to control when, where, and under what conditions a file is authorized for access by an approved user. For data that is shared with external partners outside the enterprise network, Keyavi can geo-locate and pinpoint the exact location of any data access, ensuring sensitive files can only be opened only in approved locations.

Visibility

Keyavi-protected files are enabled with near real-time forensics. Each time a file is opened, a history of events is reported in the administrative dashboard of the Keyavi Service Node (defined below). The forensics gathered include:

  1. Who accessed the document
  2. When the document was accessed
  3. Where the document was accessed from
  4. On which device the document was accessed

Control

Keyavi’s most innovative feature is continuous control. Are you concerned that a confidential file could be intentionally shared via email or accidentally uploaded to cloud storage? Not a problem – with Keyavi, you can quickly and easily revoke access to the file. Was a user’s laptop or mobile phone stolen? No worries! With Keyavi, you can permanently suspend access to Keyavi-protected documents on the lost or stolen device. Data protected with Keyavi is always under your control, with policies for both online and offline access, no matter where the data resides.