Data breach resolution
Unfortunately, company data breaches continue to escalate with no end in site. Response to these breaches has been to offer affected customers a year subscription to a credit monitoring service. While a nice gesture, this does very little to protect the consumer who most likely already has a like service. Instead, if your firm has been either directly or indirectly compromised, why not offer your valued customers a real solution at a fraction the cost of a credit monitoring service?
Offer your valued customers our award winning Safe which will protect their passwords and files, giving users the ability to control their own data while providing a data inheritance feature which everyone in todays digital world desperately needs.
Offer your valued customers our award winning Safe which will protect their passwords and files, giving users the ability to control their own data while providing a data inheritance feature which everyone in todays digital world desperately needs.
Cloud storage
Store all your important files in a highly secure digital safe. Thanks to triple redundant data storage, your documents benefit from high-end protection, thus avoiding potential data loss.
Password Manager
With our integrated Password Manager, you create and manage highly secure passwords for each of your online accounts. It comes with a password generator for strong password suggestions.
Secure File Send
Use the Secure Send feature to encrypt and send files of up to 2 GB in size to any recipient of your choice. The recipient does not need a Safe account to download the files.
Data Inheritance
Data Inheritance lets you ensure that family members or business partners have access to important information such as PINs and passwords in the event that you pass away unexpectedly.
Store all your important files in a highly secure digital safe. Thanks to triple redundant data storage, your documents benefit from high-end protection, thus avoiding potential data loss.
Password Manager
With our integrated Password Manager, you create and manage highly secure passwords for each of your online accounts. It comes with a password generator for strong password suggestions.
Secure File Send
Use the Secure Send feature to encrypt and send files of up to 2 GB in size to any recipient of your choice. The recipient does not need a Safe account to download the files.
Data Inheritance
Data Inheritance lets you ensure that family members or business partners have access to important information such as PINs and passwords in the event that you pass away unexpectedly.
Encryption
The Safe encrypts all client data using highly secure and internationally renowned encryption methods. The key, which is needed for decryption, is calculated directly from the user vault using PBKDF#2 (RFC 2898). User vaults are therefore well-protected against ill-intentioned hackers.
Long-term security
We use AES-256 and RSA-4096 encryption standards. These encryption methods have been designed to offer long-term protection.
Double protection during file transfer
The Safe encrypts data twice during uploading or downloading from a device to a user's online account. In addition to transfer encryption (HTTPS), data is also encrypted using an AES-256 encryption, thus ensuring complete protection of sensitive data. This means that data will remain protected even in the event the HTTPS protection is attacked. The additional encryption is particularly efficient in protecting against man-in-the-middle-attacks (MitM), for example in internet cafés and airports.
Transparent crypto architecture
All data stored in Safe accounts is encrypted by way of a multi-layered cryptographic architecture. Our security architecture has been made openly available with multiple testing by third parties.
The Safe encrypts all client data using highly secure and internationally renowned encryption methods. The key, which is needed for decryption, is calculated directly from the user vault using PBKDF#2 (RFC 2898). User vaults are therefore well-protected against ill-intentioned hackers.
Long-term security
We use AES-256 and RSA-4096 encryption standards. These encryption methods have been designed to offer long-term protection.
Double protection during file transfer
The Safe encrypts data twice during uploading or downloading from a device to a user's online account. In addition to transfer encryption (HTTPS), data is also encrypted using an AES-256 encryption, thus ensuring complete protection of sensitive data. This means that data will remain protected even in the event the HTTPS protection is attacked. The additional encryption is particularly efficient in protecting against man-in-the-middle-attacks (MitM), for example in internet cafés and airports.
Transparent crypto architecture
All data stored in Safe accounts is encrypted by way of a multi-layered cryptographic architecture. Our security architecture has been made openly available with multiple testing by third parties.