What is Keyavi Technology?

Keyavi technology is a data protectionClosed The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. platform that wraps your data with multiple layers of encryptionClosed The process of protecting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. and user-defined policiesClosed Rules associated with a protected payload that designate which users can access the encrypted file, from what locations, and for what time periods.. As a result, your data becomes self-protecting, smart or intelligent, and self-aware.

Why is it called "smart" or "intelligent" data?
Let's say, for example, you have a Microsoft Word file, and you want to protect it. Keyavi takes the information about your data, which we call payload, and encrypts it with AES technology. This creates the Intelligent Keyavi Data (IKD) file structure, resulting in smart or intelligent data.

Keyavi embeds encryption and policy-based protection directly into the data, making the IKD filesClosed Short for "Intelligent Keyavi Data" and is the file extension for a Keyavi-protected file. This file has multiple layers of encryption and policy-based rulesets infused into the data itself, making it self-protecting, intelligent, and self-aware. transport agnostic. In other words, data owners can share files through any method, for example, by attaching them to emails, uploading them to cloud services, or storing them on a USB drive. Authorized recipients can also share the files with those same methods. Still, the file will only be accessible by other authorized recipients specified by the data ownerClosed A user that encrypts the file with Keyavi and maintains control of that data throughout its lifecycle from the Data Management Console..

Keyavi Features

Keyavi puts data under your control with features including:

  • Protect files and control who has access to them.

  • Prevent screen capture and video recording of documents.

  • Establish global geopolicies to allow or exclude locations.

  • Set a time limit for when access to the data begins and expires.

  • Remove access from previously shared data.

  • Protect specific directories with Intelligent Directory™.

  • View the entire lifecycle of Keyavi-protected data (chain of custody).

Keyavi Suite of Applications

The Keyavi suite of applications provides a user-friendly, intuitive interface to help you maintain complete control of your protected data.

Application

Type

Description

Keyavi Windows and Mac Apps Desktop app A user-friendly, intuitive desktop application for Windows and Mac to help you maintain complete control of your protected data.

Keyavi iOS and Android Apps

Mobile app

Access Keyavi-protected files on the go with an iPhone, iPad, or Android device.

Keyavi Web

Web browser

Keyavi standard Configuration only.

Not all users can download and install Keyavi, so Keyavi offers a web client to protect and openClosed The process of decrypting a protected, encrypted file and transforming it back into its original, accessible form for authorized users based on policies set for that file. IKD files. Keyavi Web allows read-only access. The only difference is that you won't be able to right-click on files to protect or decryptClosed The process of opening a protected, encrypted file and transforming it back into its original, accessible form for authorized users based on policies set for that file. them.
Keyavi Portal Web browser An administration portal for data owners to monitor and manage their protected data. It's also the backend for the Keyavi User, Policy, and Security Administrators.

Keyavi Public API

API

Use Keyavi APIs to embed data protection into your own apps and workflows, and control all aspects of the Keyavi platform, including protecting and opening files, maintaining company-wide policies, provisioning users, and adding audit and forensics logs to your security stack.

Keyavi Outlook Plugin

Outlook plugin

The Keyavi Outlook Plugin for Microsoft 365 Outlook clients allows you to send protected files to anyone

Keyavi Configurations

Organizations implement Keyavi with one of two possible configurations: Keyavi Standard Configuration and Keyavi Standard Configuration with Consumer Support. The primary difference between them is how external users access Keyavi-protected files. In Keyavi Standard Configuration, external users use Keyavi Web to access Keyavi data. In Keyavi Standard Configuration with Consumer Support external users log in with their existing Microsoft, Google, or Apple credentials.