What is Keyavi Technology?
Keyavi technology is a data protection The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. platform that wraps your data with multiple layers of encryption
The process of protecting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. and user-defined policies
Rules associated with a protected payload that designate which users can access the encrypted file, from what locations, and for what time periods.. As a result, your data becomes self-protecting, smart or intelligent, and self-aware.
Why is it called "smart" or "intelligent" data?
Let's say, for example, you have a Microsoft Word file, and you want to protect it. Keyavi takes the information about your data, which we call payload, and encrypts it with AES technology. This creates the Intelligent Keyavi Data (IKD) file structure, resulting in smart or intelligent data.
Keyavi embeds encryption and policy-based protection directly into the data, making the IKD files Short for "Intelligent Keyavi Data" and is the file extension for a Keyavi-protected file. This file has multiple layers of encryption and policy-based rulesets infused into the data itself, making it self-protecting, intelligent, and self-aware. transport agnostic. In other words, data owners can share files through any method, for example, by attaching them to emails, uploading them to cloud services, or storing them on a USB drive. Authorized recipients can also share the files with those same methods. Still, the file will only be accessible by other authorized recipients specified by the data owner
A user that encrypts the file with Keyavi and maintains control of that data throughout its lifecycle from the Data Management Console..
Keyavi Features
Keyavi puts data under your control with features including:
-
Protect files and control who has access to them.
-
Prevent screen capture and video recording of documents.
-
Establish global geopolicies to allow or exclude locations.
-
Set a time limit for when access to the data begins and expires.
-
Remove access from previously shared data.
-
Protect specific directories with Intelligent Directory™.
-
View the entire lifecycle of Keyavi-protected data (chain of custody).
Keyavi Suite of Applications
The Keyavi suite of applications provides a user-friendly, intuitive interface to help you maintain complete control of your protected data.
Application |
Type |
Description |
---|---|---|
Keyavi Windows and Mac Apps | Desktop app | A user-friendly, intuitive desktop application for Windows and Mac to help you maintain complete control of your protected data. |
Keyavi iOS and Android Apps |
Mobile app |
Access Keyavi-protected files on the go with an iPhone, iPad, or Android device. |
Keyavi Web |
Web browser Keyavi standard Configuration only. |
Not all users can download and install Keyavi, so Keyavi offers a web client to protect and open![]() ![]() |
Keyavi Portal | Web browser | An administration portal for data owners to monitor and manage their protected data. It's also the backend for the Keyavi User, Policy, and Security Administrators. |
Keyavi Public API |
API |
Use Keyavi APIs to embed data protection into your own apps and workflows, and control all aspects of the Keyavi platform, including protecting and opening files, maintaining company-wide policies, provisioning users, and adding audit and forensics logs to your security stack. |
Keyavi Outlook Plugin |
Outlook plugin |
The Keyavi Outlook Plugin for Microsoft 365 Outlook clients allows you to send protected files to anyone |
Keyavi Configurations
Organizations implement Keyavi with one of two possible configurations: Keyavi Standard Configuration and Keyavi Standard Configuration with Consumer Support. The primary difference between them is how external users access Keyavi-protected files. In Keyavi Standard Configuration, external users use Keyavi Web to access Keyavi data. In Keyavi Standard Configuration with Consumer Support external users log in with their existing Microsoft, Google, or Apple credentials.