Confisense

Environment based encryption

Secure yourself against:

  • Data leaks – lost or stolen data
  • User impersonation/Identity theft
  • Malware or trojans introduced to enterprise networks
  • Unsecured data storage

ALL your data, secured.

Why you need Confisense:

  1. Know confidently that your data is protected, and recipients are verified, wherever they are in the world.
  2. End-to-end data security
  3. Environment based encryption
  4. Know confidently where your data comes from, where it’s going and who is opening it
  5. Secure your data and restrict its access to a predefined space or environment. 
English_get it from MS_864X312
Download
Coming soon
Coming soon

How Confisense works:

★ Confisense allows for safe transportation or storage of data within the public space* and allows for the opening of data in specific locations only. 

★ Remote communication is secured by means of a unique key exchange powered by the elliptic curve cryptographic algorithm and symmetric encryption.

★ This allows a sender and a receiver to interact with a secured file while maintaining a private security channel between the sender and receiver.

★ The Eccenscia Security Network validates the software installation and verifies the validity of the user’s software.

★ Our anti-tampering algorithm verifies each of the files that make up the Confisense software, including generated configuration files to detect any tampering that may have occurred.

 

* Public space is defined as anywhere outside of the local ecosystem.

 

Product Features

You dont need to have an IT degree to use the solution. It is quick and easy to setup. Don’t believe us? Try the free version.

Files and folders are protected and may only be open by the recipient at their specified environment, location or workplace. The user’s environment is scanned and evaluated using Eccenscia proprietary environment authentication algorithm. The algorithm does allow for non-consistency in ever changing environments.

Cryptographic keys are at the heart of security on any digital system. Owning your own key gives you the ability to manage your own security. It is private to you and you alone.

Data Security Algorithms used have never been hacked (NIST-P256 elliptic curve cryptographic algorithms). The elliptic curve algorithm has been implemented for secure key exchange. Data is encrypted, signed and verified, which prevents data manipulation and secured transport of sensitive data.

Contact information is provided to a 3rd party on request and user approval only. This places the security 100% in the user’s control. Self-managed contacts ( dual authenticated contacts) .

Confisense adds environmental authentication , identity verification and access authorization with Uloq technology.

Your personal vault is a protected area in Confisense where you store your private and sensitive files.

Encrypt or secure a file over public channels for a specific contact that cannot be decrypted by anyone else except by your specified contact.

Files sent via emails, or even social media can be served via end to end encryption.

Users are notified if changes are made on encrypted OR DECYPTED? file on their device and can approve or deny the changes. Each of the files which make up the Confisense software are hashed and compared to our security network database. This reduces the risk of tampering on a stolen computer.

Uloq Integrated for remote authentication, verification and authorization (files may only be unlocked by the receivers once authorisation has been given by the data owner). Remote authorisation using Uloq. This allows the user to verify their environment using a remote key. The key incorporates personal identification using fingerprint or password, does the environmental scan. They keys are registered on the Eccenscia Security Network and the environment verification is done on the Confisense software.

Easy to use

You don’t need an IT degree to use Confisense. It is quick and easy to setup. Don’t believe us? Try the free version. TRY IT FREE!

Environment Driven Authentication

Files and folders are protected and may only be open by the recipient at their specified environment, location, or workplace.

User owns the cryptographic private keys

Cryptographic keys are at the heart of security on any digital system. Owning your own key gives you the ability to manage your own security. It is private to you and you alone.

Serious Security

The Data Security Algorithms used in Confisense are based on NIST-P256 elliptic curve cryptographic algorithms. The elliptic curve algorithm has been implemented for secure key exchange.

Contact Management

Contact information is provided to a 3rd party on request and user approval only. This places the security 100% in the user’s control.

Access to files is completely in your control

Confisense adds environmental authentication, identity verification and access authorization with Uloq (Mobile App) technology.

Personal Vault

Your personal vault is a protected area in Confisense where you store your private and sensitive files.

End-to-end Encryption

Encrypt or secure a file over public channels for a specific contact that cannot be decrypted by anyone else except by your specified contact.

Emails, Photos, or even social media

Files sent via email, or social media are secured via an end to end encryption.

Anti-tampering, File change notification & Verification

Users are notified if changes are made on the files in their Confisense Vault. They can approve/decline the changes.

Works with Uloq

Uloq is integrated with Confisense for remote authentication, verification, and authorization.

Personal vault

Encryption

Decryption

Uloq Keys

Environments

Bridged Environments

Secured Contact

Remote decryption verification (Uloq)

Data recovery phrase

User owned keys

Free

$0

Personal

$39.00

Business

$59.00

Key features

Personal vault

Store up to 50 files

Encryption

Yes

Decryption

Yes

Uloq Keys

1

Environments

1

Bridget Environments

N/A

Secured Contact

N/A

Remote decryption verification (Uloq)

Yes

Data recovery phrase

Yes

User owned keys

Yes

We adopt a Zero Trust methodology

Principles
Verify explicitly
Least Privilege
Assume breach
What it
means
Always authenticate and authorize based on all available data points, including user identity, location, device health, service or workload, data classification, and anomalies



Limit user access with just-in-time and just-enough-access (JIT/JEA), risk based adaptive policies, and data protection to help secure both data and productivity.
Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defences.
How we
tackle it
1. Confisense verifies data origination by creating a relationship between senders and receivers. This relationship is verified using key deriving algorithms.
2. Confisense verifies the identity of the user. This is done using Uloq.
1. Data access is limited by environmental and identity authorization.
2. The configuration files are not accessible to system users.
1. Access to Confisense can be restricted using Uloq as a second-factor authentication.
2. Application setting changes can be protected and authorized with a Uloq key. (No setups and settings changes are permitted without performing an identity verification using Uloq. )
3. Files cannot be decrypted without a user being fully identified by Uloq.

What it means

Verify explicitly

Always authenticate and authorize based on all available data points, including user identity, location, device health, service or workload, data classification, and anomalies

Least Privilege

Limit user access with just-in-time and just-enough-access (JIT/JEA), risk based adaptive policies, and data protection to help secure both data and productivity.

Assume breach

Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defences.

How we tackle it

Verify explicitly

  1. Confisense verifies data origination by creating a relationship between senders and receivers. This relationship is verified using key deriving algorithms.
  2. Confisense verifies the identity of the user. This is done using Uloq.

Least Privilege

  1. Data access is limited by environmental and identity authorization.
  2. The configuration files are not accessible to system users.

Assume breach

  1. Access to Confisense can be restricted using Uloq as a second-factor authentication.
  2. Application setting changes can be protected and authorized with a Uloq key. (No setups and settings changes are permitted without performing an identity verification using Uloq. )
  3. Files cannot be decrypted without a user being fully identified by Uloq.

Download Confisense

We’d love to send you more information about Confisense and how you can use it to protect your information.

Please enter your email address to continue.

Download Confisense

For which operating system would you like to download Confisense?

English_get it from MS_864X312
Download
Coming soon
Coming soon