FAQs

If you're not finding the answers to your questions in the User Guide and Admin Guide, this page will help you. It's updated as-needed with answers to common customer questions or issues.

General FAQs
Can I protect a single folder?

Yes, either with Keyavi (desktop), Keyavi Web, or by right-clicking the folder in Windows Explorer.

Can I share self-protecting data with someone who is not a Keyavi-licensed user?

Yes, first-time recipients of an IKD (Keyavi protectedClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner.) file can use the web viewer or click to install the free, quick, read-only viewer to access the shared information. All subsequent data sharing will automatically openClosedThe process of decrypting a protected, encrypted file and transforming it back into its original, accessible form for authorized users based on policies set for that file. in the same viewer.

Can I use a mobile hotspot or a mobile router to access protected files in the desktop app?

Yes, you should be able to access protectedClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. files if your device is able to get your physical location from the mobile hotspot or the mobile router.

Can Keyavi be used to delete a file?

No, Keyavi applications do not delete files or change the original files.

Do I have to be connected to the internet to use Keyavi?

No, Keyavi technology defaults to "safe and closed" to keep your files protectedClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner., even when offline. You can use Keyavi's default setting, or you can edit and adapt custom policiesClosedRules associated with a protected payload that designate which users can access the encrypted file, from what locations, and for what time periods. to allow for varying levels of flexibility and risk mitigation for online and offline access.

Does Keyavi have access to my data or store or transmit my data?

Keyavi never accesses, stores, indexes, or intercepts your data. Our hands-off approach is fundamental to the mission of our company. Our technology works on your device, allowing your data to stay on your end or wherever you choose to send and store it while staying protectedClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. and only accessible by you and those you authorize.

Does Keyavi protect against print screen capture in conference call sharing (Zoom, Microsoft Teams, WebEx)?

Yes. It's a standard function of Read-only modeClosedFiles protected with read-only mode open in the file type's default application. The file cannot be copied, printed, shared, or saved. for Keyavi-protected data. In this mode, files can be set to not allow any screen captures (print screen, snipping tool) and prevent screen sharing through platforms. While the rest of the screen may be visible, the protectedClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. file will be blacked out to viewers.

Does Keyavi use CryptoAPI?

Yes.

How accurate is the geofencing location control?

The geofencing technology capability allows data owners to authorize data access at the country, state city, or physical address level. Keyavi is accurate to several miles from the user, although this might vary depending on location, service provider, and signal strength.

How do I reassign ownership of a file?

For instructions, see Reassign Data (Change Owners).

How does Keyavi help with ransomware?

Keyavi protectsClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. the data contained within files from being exposed, even if exfiltrated by ransomware affiliated threat actors.

How long does it take to encrypt a file?

It takes approximately one second to protectClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. your files in most cases. It may take slightly longer depending on the file size, your computer power, and your network connections in more complex cases.

What can I do if I don't have enough storage space to open a large file?

If you receive a message that you don't have enough space to openClosedThe process of decrypting a protected, encrypted file and transforming it back into its original, accessible form for authorized users based on policies set for that file. a file, you can free up storage or add additional storage capacity. We've collected several articles with steps and recommendations to help you update your device.

Free Up Space

Review these recommended resources for your device:

Add Storage Capacity

faq-storage.htm
What does "platform- and transport-agnostic" mean?

Keyavi's encryptionClosedThe process of protecting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. and policy-based protectionClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. are infused directly into the data itself. This protection is enabled across all platforms, methods of transit, operating systems, and device types. For example, this means that data stored on any flash drive, uploaded to any cloud service, or emailed through any provider can be protected by Keyavi.

Why can't I edit a file that I received?
Admin FAQs
Can I share data at an organizational level with unlicensed users?

Yes, organizations can share data at an organizational level with unlicensed users however those unlicensed users will only able to access protectedClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. data in Read-only modeClosedFiles protected with read-only mode open in the file type's default application. The file cannot be copied, printed, shared, or saved. and will not be able to edit the data or extract it from its protected container.

Can Keyavi be used to protect information stored in a database?

No. Today, Keyavi does not support protectingClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. information stored in a database. This enhancement is planned for future releases.

Can Keyavi be used to protect structured data?

No. As of today, you can protectClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. any standalone file with Keyavi technology. However, support for structured data is planned for future releases.

Can the Keyavi technology be installed on-premises?

Yes, for those companies that require it, we offer the ability to localize the service to their environment. Contact Sales for more information.

Does the Keyavi process have any latency or lag?
How do I troubleshoot user authentication errors for unmanaged users?

Unmanaged users are Keyavi users who sign in with social accounts like Microsoft, Apple ID, or Google in Keyavi Standard Configuration with Consumer SupportClosedA Keyavi configuration that allows external users view-only access to Keyavi-protected files. External users with Google, Microsoft, and Apple email addresses must be added in the Keyavi Portal before authenticating with Keyavi.. Their identities are not managed in Azure Active Directory, unlike the managed users in your organization.

When unmanaged users encounter an error signing in to a Keyavi appClosedLightweight software interface that provides a user-friendly, intuitive interaction with Keyavi's technology. It allows users to create new and open intelligent files and manage settings easily. they see this error message:

We're unable to sign you in. Please contact your Keyavi user administrator or the person who sent you the file.

The two most likely reasons are:

  • The user is not set up in the Keyavi Portal and there's no matching record in the database.

  • The user is trying to sign in with a service that's different from the one they used on first sign-up. Unmanaged users can sign-in only with a single service.

To troubleshoot, check that the user is set up in the Keyavi Portal. If they are, have the user confirm that they're signing in with the same service that they signed up with.

What do I do if my WAF is blocking file-protect actions in the Keyavi Web App?

If you encounter a false positive caused by an OWASP Core Ruleset-enabled Web Application Firewall (WAF) during protectClosedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. actions when using Keyavi Web, do one of the following:

  • Adjust the OWASP paranoia level and threshold.

  • Add a WAF exception to bypass specific false positives for endpoints.