FAQs
If you're not finding the answers to your questions in the User Guide and Admin Guide, this page will help you. It's updated as-needed with answers to common customer questions or issues.
Yes, either with Keyavi (desktop), Keyavi Web, or by right-clicking the folder in Windows Explorer.
Yes, first-time recipients of an IKD (Keyavi protectedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner.) file can use the web viewer or click to install the free, quick, read-only viewer to access the shared information. All subsequent data sharing will automatically open
The process of decrypting a protected, encrypted file and transforming it back into its original, accessible form for authorized users based on policies set for that file. in the same viewer.
Yes, you should be able to access protectedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. files if your device is able to get your physical location from the mobile hotspot or the mobile router.
No, Keyavi applications do not delete files or change the original files.
No, Keyavi technology defaults to "safe and closed" to keep your files protectedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner., even when offline. You can use Keyavi's default setting, or you can edit and adapt custom policies
Rules associated with a protected payload that designate which users can access the encrypted file, from what locations, and for what time periods. to allow for varying levels of flexibility and risk mitigation for online and offline access.
Keyavi never accesses, stores, indexes, or intercepts your data. Our hands-off approach is fundamental to the mission of our company. Our technology works on your device, allowing your data to stay on your end or wherever you choose to send and store it while staying protectedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. and only accessible by you and those you authorize.
You can store Keyavi-protected filesFiles and data with a .IKD extension secured by encryption. IKD files are tied to granular access policies that stay with the data no matter where it resides, offering centralized control over file sharing and collaboration. on Dropbox and Box, but it's not possible to protect
The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. a file that you've saved in cloud storage. However, this functionality is planned for a future release.
You can store Keyavi-protected filesFiles and data with a .IKD extension secured by encryption. IKD files are tied to granular access policies that stay with the data no matter where it resides, offering centralized control over file sharing and collaboration. on Google Drive, but it's not possible to protect
The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. a file that you've saved in cloud storage. However, this functionality is planned for a future release.
You can store Keyavi-protected filesFiles and data with a .IKD extension secured by encryption. IKD files are tied to granular access policies that stay with the data no matter where it resides, offering centralized control over file sharing and collaboration. on Google Drive, but it's not possible to protect
The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. a file that you've saved in cloud storage. However, this functionality is planned for future release.
You can store Keyavi-protected filesFiles and data with a .IKD extension secured by encryption. IKD files are tied to granular access policies that stay with the data no matter where it resides, offering centralized control over file sharing and collaboration. on SharePoint, but it's not possible to protect
The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. a file that you've saved in cloud storage. However, this functionality is planned for a future release.
Yes. It's a standard function of Read-only modeFiles protected with read-only mode open in the file type's default application. The file cannot be copied, printed, shared, or saved. for Keyavi-protected data. In this mode, files can be set to not allow any screen captures (print screen, snipping tool) and prevent screen sharing through platforms. While the rest of the screen may be visible, the protected
The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. file will be blacked out to viewers.
Yes.
The geofencing technology capability allows data owners to authorize data access at the country, state city, or physical address level. Keyavi is accurate to several miles from the user, although this might vary depending on location, service provider, and signal strength.
For instructions, see Reassign Data (Change Owners).
Keyavi protectsThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. the data contained within files from being exposed, even if exfiltrated by ransomware affiliated threat actors.
It takes approximately one second to protectThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. your files in most cases. It may take slightly longer depending on the file size, your computer power, and your network connections in more complex cases.
If you receive a message that you don't have enough space to openThe process of decrypting a protected, encrypted file and transforming it back into its original, accessible form for authorized users based on policies set for that file. a file, you can free up storage or add additional storage capacity. We've collected several articles with steps and recommendations to help you update your device.
Free Up Space
Review these recommended resources for your device:
-
Windows: Free up drive space in Windows (Microsoft Support)
-
Mac: Free up storage space on your Mac (Apple Support)
-
iOS: Manage your photo and video storage (Apple Support)
-
Android: Free up space (Android Help)
Add Storage Capacity
-
Windows: How to Increase Space in C Drive Using Disk Management (Windows Report)
-
Mac: How to Resize a Mac Volume With Disk Utility (Lifewire)
Keyavi's encryptionThe process of protecting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. and policy-based protection
The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. are infused directly into the data itself. This protection is enabled across all platforms, methods of transit, operating systems, and device types. For example, this means that data stored on any flash drive, uploaded to any cloud service, or emailed through any provider can be protected by Keyavi.
An IKD (Intelligent Keyavi Data) file refers to the file extension appended to your data once you enable Keyavi protectionThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner.. An IKD file
Short for "Intelligent Keyavi Data" and is the file extension for a Keyavi-protected file. This file has multiple layers of encryption and policy-based rulesets infused into the data itself, making it self-protecting, intelligent, and self-aware. is self-protecting, intelligent, and self-aware.
The Keyavi Web incorporates most functionality of Keyavi. The only difference is that you won't be able to right-click on files to protectThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. or decrypt
The process of opening a protected, encrypted file and transforming it back into its original, accessible form for authorized users based on policies set for that file. them.
If you're unable to modify a file, this means the data ownerA user that encrypts the file with Keyavi and maintains control of that data throughout its lifecycle from the Data Management Console. sent you a Read-only file.
Yes, organizations can share data at an organizational level with unlicensed users however those unlicensed users will only able to access protectedThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. data in Read-only mode
Files protected with read-only mode open in the file type's default application. The file cannot be copied, printed, shared, or saved. and will not be able to edit the data or extract it from its protected container.
You can store Keyavi-protected filesFiles and data with a .IKD extension secured by encryption. IKD files are tied to granular access policies that stay with the data no matter where it resides, offering centralized control over file sharing and collaboration. in a local Git repository and push/publish them to a remote Git repository. However, protecting
The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. a file directly in a remote repository isn't possible.
No. Today, Keyavi does not support protectingThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. information stored in a database. This enhancement is planned for future releases.
No. As of today, you can protectThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. any standalone file with Keyavi technology. However, support for structured data is planned for future releases.
Yes, for those companies that require it, we offer the ability to localize the service to their environment. Contact Sales for more information.
The performance of the Keyavi applications depends on multiple factors, such as server and network configuration, the size of the files, and so on. In general, openingThe process of decrypting a protected, encrypted file and transforming it back into its original, accessible form for authorized users based on policies set for that file. and protecting
The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. a file should not take more than a few seconds.
Unmanaged users are Keyavi users who sign in with social accounts like Microsoft, Apple ID, or Google in Keyavi Standard Configuration with Consumer SupportA Keyavi configuration that allows external users view-only access to Keyavi-protected files. External users with Google, Microsoft, and Apple email addresses must be added in the Keyavi Portal before authenticating with Keyavi.. Their identities are not managed in Azure Active Directory, unlike the managed users in your organization.
When unmanaged users encounter an error signing in to a Keyavi appLightweight software interface that provides a user-friendly, intuitive interaction with Keyavi's technology. It allows users to create new and open intelligent files and manage settings easily. they see this error message:
We're unable to sign you in. Please contact your Keyavi user administrator or the person who sent you the file.
The two most likely reasons are:
-
The user is not set up in the Keyavi Portal and there's no matching record in the database.
-
The user is trying to sign in with a service that's different from the one they used on first sign-up. Unmanaged users can sign-in only with a single service.
To troubleshoot, check that the user is set up in the Keyavi Portal. If they are, have the user confirm that they're signing in with the same service that they signed up with.
If you encounter a false positive caused by an OWASP Core Ruleset-enabled Web Application Firewall (WAF) during protectThe process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. actions when using Keyavi Web, do one of the following:
-
Adjust the OWASP paranoia level and threshold.
-
Add a WAF exception to bypass specific false positives for endpoints.