Professional Documents
Culture Documents
How are external users authorized to view & use SmartCipher protected files, and how does SmartCipher recognize and authenticate them?
SmartCipher works in a similar manner for both internal and external users. External users register one-time with the system via email exchange, and SmartCipher then automatically generates personalized encryption keys and takes care of authentication; there is no need to remember passwords or keys. The whole process is transparent to the enduser and there is no need for Active Directory exposure or federation. When an external, authorized user receives a SmartCipher encrypted file, the sensor automatically decrypts the file and usage policy and govern the use. Needless to say, if the user is unauthorized, the document will not open.
If the usage rights of a document are changed after a file has been sent, does the document need to be resent?
No. The SmartFile Management System facilitates dynamic rule changes, in which rule changes propagate automatically to all the protected files.
SALES
Can SmartCipher control access to data by removable media (CDs, USB drives, email etc)?
Yes. SmartCipher enables the administrator to create rules and policies in order to define what environments the file will open, for example: only in the network, or only on a specific laptop, etc. This is a main advantage of file-based security. SmartCipher doesnt physically prevent the movement of the file, rather it controls file usage.