You are on page 1of 2

TECHNICAL

FREQUANTLY ASKED QUESTIONS


What impact will SmartCipher have on my existing network utilization and end-users?
Covertix SmartCipher works automatically and is transparent to the end-user, requiring no extra effort on the endusers part and ensuring smooth, uninterrupted workflow. The same is true regarding network performance.

What encryption standard is utilized for data protection?


SmartCipher utilizes standard encryption technology, AES256 based encryption, to secure and protect confidential documents and sensitive data, travelling with the file both inside and outside the organization.

How are external users authorized to view & use SmartCipher protected files, and how does SmartCipher recognize and authenticate them?
SmartCipher works in a similar manner for both internal and external users. External users register one-time with the system via email exchange, and SmartCipher then automatically generates personalized encryption keys and takes care of authentication; there is no need to remember passwords or keys. The whole process is transparent to the enduser and there is no need for Active Directory exposure or federation. When an external, authorized user receives a SmartCipher encrypted file, the sensor automatically decrypts the file and usage policy and govern the use. Needless to say, if the user is unauthorized, the document will not open.

If the usage rights of a document are changed after a file has been sent, does the document need to be resent?
No. The SmartFile Management System facilitates dynamic rule changes, in which rule changes propagate automatically to all the protected files.

How does the system handles exceptions or roll back?


Since the SmartCipher is based upon policies attached to smart files , and in no way are storage devices modified, it is basically a non-issue to uninstall the application from an organizations system. Policies can be rolled back and removed from files on per file, per policy or location basis.

Does Covertix SmartCipher Management system provide web based administration?


Yes. The SmartCipher Management System is an entirely web-based enabling real time administration of user and file usage control, inside and outside the organization, both online and offline.

How can SmartCipher identify sensitive documents based on content?


SmartCipher can identify sensitive content, such as credit card information, social security numbers or any custom phrases or key-words and apply protection seamlessly.

Can SmartCipher change between Shadow Mode and Active Mode?


Yes. The two modes of operation are interchangeable and can be activated at any point as needed.

Does the server requires 24/7 availability?


The SmartCipher system doesnt require connection to the server at all. SmartCipher is a file-level, rights-management system that secures and monitors sensitive data, within and beyond the organization.Usage policies are contained within the file and a connection with the server is not required, it natively operates offline as well.

SALES

FREQUANTLY ASKED QUESTIONS


What is the difference between Covertix SmartCipher solution and DLP?
SmartCipher is a file-based DRM product that seamlessly safeguards and controls sensitive information on any device, both inside and outside the organization, even if shared with third parties, stolen or lost. DLP solutions are data gatekeepers that protect data at the perimeter of an organizations network by detecting and preventing the unauthorized transmission of information from the network to external users. Covertix, although an IRM player, offers inherent DLP capabilities as an integral part of its data centric protection. SmartCipher Shadow Mode enables accurate analysis and monitoring of the organizations data, and protects it both inside and outside the organization, reaching beyond the perimeter

Does SmartCipher require Microsoft RMS?


Covertix SmartCipher is a turnkey standalone IRM solution that protects digital assets without the need for any additional software applications, such as Microsoft RMS etc, resulting in a lower total cost of ownership. In terms of technology, SmartCipher is not limited by the rules framework of any IRM application, providing the user with total flexibility to customize and define the scope of protection.

Can SmartCipher control access to data by removable media (CDs, USB drives, email etc)?
Yes. SmartCipher enables the administrator to create rules and policies in order to define what environments the file will open, for example: only in the network, or only on a specific laptop, etc. This is a main advantage of file-based security. SmartCipher doesnt physically prevent the movement of the file, rather it controls file usage.

How does SmartCipher protect documents when the user is offline?


SmartCipher travels with the file and usage policies are contained therein. As an independent solution, SmartCipher does not require a connection with the server to provide iron-clad protection.

Does SmartCipher support SmartPhone mobile devices?


While SmartCipher is operating in Shadow Mode, files can be opened and viewed on suitable mobile devices. However, when operating in Active Mode, SmartCipher prevents encrypted files from being opened.

What is Shadow Mode and how does it work?


SmartCiphers Shadow Mode performs two key file-level security background tasks File Tracking and File Surveillance. Shadow Mode provides a clear, comprehensive and real-time status representation of all designated digital assets and their usage with no encryption at this stage.

Whats the impact to the end-user?


SmartCipher enables transparent monitoring of sensitive files with zero workflow interruption to users. SmartCipher system does not expect users to attend to security decision making processes, as the system automatically targets and tags the sensitive data. SmartCipher also enables Surface Level Administration, allowing IT administrators to attend to files (maintenance, backup etc) without being exposed to the secured content therein, ensuring separation of duties. SmartCiphers transparent implementation is performed by engaging the surveillance feature of its Shadow Mode deployment.

You might also like