Below is a collection of frequently asked questions we have collected from our clients. Have more questions? Send us a message.
No. Active Cypher does not require dedicated hardware or third-party, non-Microsoft platforms. It simply extends the effectiveness of the Microsoft Active Directory architecture and administrative skills your organization has today.
In order to run Active Cypher, you need:
- Microsoft Server 2008 R2 or newer
- Windows 7 or newer client (Windows 10 preferred)
- A Microsoft Azure or Office 365 subscription
You can download and run our Active Cypher Scouting Agent to confirm that your Active Directory, Networking, and File Server requirements are proper to run Active Cypher File Security in your environment.
Active Cypher Scout is a single-use utility that you download and run from your server. An analysis is performed of the local File Server, Shared Folders, Active Directory – Users & Security Groups, and your Azure Active Directory synchronization status. Any area not properly aligned with Active Cypher deployment needs can (most times) be interactively rectified from within the Scout utility. Information gathered by the Active Cypher Scout is stored privately within the executed folder.
Active Cypher is deployed to your File Server, local Active Directory, and Azure Subscription. Users can continue work uninterrupted during deployment. The install process typically completes in an afternoon.
No. You configure Active Cypher to monitor and protect files in standard Microsoft Shared Networked Folders by assigning the Active Cypher Protection – Security Group to the network share (such as Accounting).
Yes. For example, you can allow one or more Security Groups to have decrypted access to the files and their protected contents, while also limiting other Security Groups so they can only access the files in encrypted form. These organizational decisions are retained solely by you as the client.
This flexibility allows groups, such as process operators and system admins, to perform such file-level functions as backup, without ever having access to the underlying protected file contents.
The simple answer is: Nothing. All files protected by Active Cypher can only be opened by someone with the proper access permission and authority. If a protected file is accidentally or intentionally sent to an unauthorized person; or if a file is lost, stolen or sent to the cloud, the data in that file remains protected – indefinitely.
Yes, there is a workstation component of Active Cypher. It is delivered as a Windows MSI file designed for automated deployment methods.
No. Active Cypher has been designed to operate in the background without need for external administration. All operating parameters are derived from your Active Directory information.
No. Users and employees use their network system just as they always have in the past. Once again, Active Cypher is transparent to the user/employee.
No. Active Cypher is file agnostic. It protects files of any type and size.
The owner of Azure subscription. All key access and management is governed within your Azure Tenant. No third party has access to your keys, not even us. During deployment, Active Cypher creates a secured Private Cloud. We only track the number of keys licensed to the client. Once the installation completes, we have no other access or connection to the client’s cloud.
Simply put, the keys cannot be “stolen”. More specifically, Active Cypher decryption requires several verification and validation processes be performed prior to usage of the keys.
No. Active Cypher is infinitely scalable. The structure and capability of Active Cypher to expand alongside a client’s need is as limitless as Microsoft Azure. As a company expands, Active Cypher expands right alongside.