Keyavi Glossary

    A
  • A specific window of time when access is allowed to a file. The time frames can be open-ended, so you can set just a beginning date and time or ending date and time.
  • The Administrator (or admin) is a user of the technology who has escalated privileges. Admins can manage users, view dashboards at the organizational and individual user level, and geolocation.
  • Detailed records of events and actions taken related to specific payloads such as file access, failed access attempts, file encryption/decryption, and changes.
  • Specified geolocation from which an authorized user can access a protected file. Geolocations can be city, country, zip code, or latitude/longitude coordinates. The data owner defines the geolocation for the protected file.
  • An authorized time frame (or time embargo, time period) is the date and time during which a file can be accessed by an authorized user. The file's data owner defines the authorized time frame.
  • A recipient with access to the secured data file. The data owner defines the authorized users.
  • D
  • A user that encrypts the file with Keyavi and maintains control of that data throughout its lifecycle from the Data Management Console.
  • The process of opening a protected, encrypted file and transforming it back into its original, accessible form for authorized users based on policies set for that file.
  • E
  • The Authorized User can view and edit the data in a protected view with limited capabilities. Users can make changes, copy, paste, and save the modifications but cannot screen share or save an unprotected copy.
  • The process of protecting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner.
  • F
  • The recipient can view and edit the data in its native application.
  • A Keyavi-licensed user account with full technology functionality to both open and create new intelligent data and the options to have Edit or Full Access modes, or both to data. In addition, a user with a Full User Group account can access the portal to view dashboards, data management, clients, and profile settings.
  • G
  • The ability to track a device’s physical whereabouts down to latitude and longitude coordinates, or more practically, a physical address, using GPS, cell phone towers, WiFi access points and IP address lookup, or a combination of these.
  • A policy type that restricts data access based on specified geographical limitations configured at the organization level and on payloads.
  • Access validation ensuring that a device's geolocation is in compliance with data access policies that define permissible geolocation boundaries, determined using a variety of configurable parameters such as country, state, zip code, street address, and latitude/longitude.
  • I
  • Short for "Intelligent Keyavi Data" and is the file extension for a Keyavi-protected file. This file has multiple layers of encryption and policy-based rulesets infused into the data itself, making it self-protecting, intelligent, and self-aware.
  • K
  • Files and data with a .IKD extension secured by encryption. IKD files are tied to granular access policies that stay with the data no matter where it resides, offering centralized control over file sharing and collaboration.
  • Lightweight software interface that provides a user-friendly, intuitive interaction with Keyavi's technology. It allows users to create new and open intelligent files and manage settings easily.
  • A Keyavi Configuration where Keyavi users are managed in the Active Directory of the organization. External users can access Keyavi-protected files only by being added to the organizations' Active Directory.
  • A Keyavi configuration that allows external users view-only access to Keyavi-protected files. External users with Google, Microsoft, and Apple email addresses must be added in the Keyavi Portal before authenticating with Keyavi.
  • The encryption/decryption key that enables local transform of a file into and out of a Keyavi-protected state. The keypack travels with the payload in order to unlock the protected data.
  • L
  • Local protection and opening refers to the integrated application handling the encryption and decryption logic itself using the keypacks and payloads from Keyavi. This provides added data control, supports larger files, and keeps sensitive data within the existing security environment.
  • O
  • The process of decrypting a protected, encrypted file and transforming it back into its original, accessible form for authorized users based on policies set for that file.
  • P
  • A database entry that carries metadata, access rules, and codes to make possible the protection and controlled sharing of data by authorized users according to the data owner's policies. Payloads enable granular data protection without moving data outside the organization's control.
  • Rules associated with a protected payload that designate which users can access the encrypted file, from what locations, and for what time periods.
  • The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner.
  • R
  • A Read-only account is a restricted Keyavi-licensed user account that only allows for Read-only mode. In other words, a user with a Read-only account can view Keyavi-protected data but cannot create new data. Unlike external users, Read-only mode users can access the portal to view dashboards, data management, and settings.
  • Files protected with read-only mode open in the file type's default application. The file cannot be copied, printed, shared, or saved.
  • Remote protection and opening refers to the encryption and decryption processes being fully handled by Keyavi's servers based on payload IDs managed by the application. This simplifies integrations but can increase data transmission depending on application needs.