Using patented, innovative technologies that leverage new approaches, AES-256 encryption standards, and unique performance accelerants, Active Cypher is your never-ending safeguard. Even better, it’s done without creating an additional burden on your users or IT staff.
Security. Performance. Assurance. That’s who we are. That’s what we deliver.
Get your free file security assessment.
Schedule a call to consult with our cyber specialists.
Cloud Storage Compatible
Active Cypher easily integrates with cloud storage services like One Drive, Office 365, SharePoint, Dropbox, Box, Google Drive and others.
100% deployed and running in under 60 minutes.
Active Cypher is easy to install and is deeply-integrated within the Microsoft Server and Azure/Office 365 environment.
Active Cypher is flexible and can be deployed on-premise, as a hybrid solution or as Cloud- only, within an hour.
If a company is performing a “lift-and-shift” into Azure, Active Cypher is there protecting all company files. This means there is no need for implementation services, technical enablement programs or customer onboarding programs.
• Windows Server 2008 R2 through Windows Server 2019
• Windows 7 through Windows 10
• Office 365 or Azure Tenant with Subscription for Domain synchronization
Due to its uniquely low latency, and minimal CPU impact, Active Cypher operates faster and more efficiently at the file level.
Easy to Install and Use
Ridiculously easy to install and deploy, with users unaware and unaffected by the encryption process. No learning curve, no training, no hassle.
Active Cypher enhances AES 256 while employing a proprietary security algorithm, utilizing a virtual one-time pad, providing greater security, randomness and obfuscation.
No Additional Resources
No hardware, no console, no control panels, no mind-numbing configuration requirements. No “shelfware”.
Deeply integrated with Windows security groups in Active Directory. Synchronizes with Office 365 and Azure Active Directory cloud services.
Files are always encrypted and only available for viewing and editing by authorized users.
How much does Active Cypher cost?
Get a quote from our customer success team.
“This particular encryption solution is unlike any that I have seen. In my 21+ years of Security Engineering, I have written and deployed many encryption solutions throughout the world and have never seen the lack of latency, masking, noise reduction, and morphing that this solution provides. This method is unique and could be a game changer.”Floyd MarshallCEO/Senior Cyber Security Engineer CECUR-IT
“The next big leap in, say, three years will be the return to using rights-managed encryption, which is asserted any time that users create or modify files. In other words, driving encryption to the bottom so that any file that moves intentionally or accidentally is automatically protected by policy. In the mobile world, there are too many ways to move files to be able to protect everything by conventional means of perimeter defenses.”John GirardGartner VP Distinguished Analyst
“As a Veteran-owned advisor for strategy, technology, and compliance in Northern Virginia we know the challenges that exist for large organizations when it comes to adopting enterprise encryption. The combination of Microsoft and Active Cypher is a tremendous value proposition to further compliance initiatives related but not limited to ICD-503, NIST, TBM, CPIC, the President’s Management Agenda, HIPAA, FDA 510(k), and FITARA.”Douglas DaileyPresident, Dailey Enterprises