Covertix Frequently Asked Questions

What types of files are supported?

Covertix is both file and platform agnostic. We are able to monitor and protect the data found in any type of document, image, video and proprietary file types.

Does Covertix require Microsoft RMS?

No. Covertix is a standalone solution that protects digital assets without the need for any additional software applications, such as Microsoft RMS etc, resulting in a lower total cost of ownership and in a reliability that is not dependent on third party software. Covertix is not limited by the rules framework of any IRM application, providing the user with total flexibility to customize and define the scope of protection

What impact will SmartCipher have on my existing network and end-users?

Covertix works automatically and is transparent to the end-user, requiring no extra effort on the end-user’s part and ensuring smooth, uninterrupted workflow. The same is true regarding network performance. For companies looking to audit in Shadow mode before implementing rule enforcement, it’s possible to run Covertix in the background with zero impact on users, and still get full control and monitoring of file use.

Can SmartCipher identity sensitive files based on content?

Yes. Covertix can identify sensitive content, such as credit card information, social security numbers or any custom phrases or key-words  and apply protection seamlessly.

What is the difference between SmartCipher and DLP?

DLP is aimed at preventing files from leaving the organization. Covertix allows files to leave the organization, but can only be opened or read by authorized parties.

For example, a legal document, RFP, or contract, by definition, is designed to leave the organization. You can’t use DLP to prevent this—the purpose of a contract is to share it with another party. SmartCipher™ can ensure that this type of document is seen ONLY by the party authorized to see it, even after it leaves the organization, even if the authorize party attempts to forward it to someone unauthorized, and even if it is intercepted somewhere in the transmission.

Why do we offer Shadow mode?

Shadow Mode provides a clear, comprehensive and real-time status of all designated digital assets and their usage – with no encryption. This allows the organization to see exactly who comes into contact with confidential data before creating policies.

Is Covertix’s SmartCipher technology patented?

Yes, Covertix received patents from the United States and the United Kingdom for its SmartCipher logic engine.

How does Covertix protect files if the user is offline?

Covertix travels with the file and usage policies are contained therein. As an independent solution, SmartCipher™ does not require a connection with the server to provide iron-clad protection.

Does Covertix support Mobile Devices?

Yes. Covertix Mobility is a web based reader enabling the user to read and annotate protected documents on any device.

Can Covertix switch between Shadow Mode & Active Mode?

Absolutely. The two modes of operation are interchangeable and can be activated at any point as needed.

Can Covertix control access to data on removable media?

Yes. Covertix enables the administrator to create rules and policies in order to define what environments the file will open, for example: only in the network, or only on a specific laptop, etc’. SmartCipher™ does not physically prevent the movement of the file, rather it controls the file usage.

Authorizing & Authenticating External Users

Covertix works in a similar manner for both internal and external users. External users register one-time with the system via email exchange, and Covertix then automatically generates personalized encryption keys and takes care of authentication; there is no need to remember passwords or keys. The whole process is transparent to the end-user and there is no need for Active Directory exposure or federation. When an external, authorized user receives a Covertix encrypted file, the sensor automatically decrypts the file and usage policy and govern the use. Needless to say, if the user is unauthorized, the file will not open.

I want to change the usage rights after the file has been sent, now what?

When a rules set is changed, the Covertix Management System immediately applies the rules to files—even those files that were already sent outside of the organization and reside on other computers. Whenever a file is accessed, the file looks back to the Covertix for the most updated rule set. Using a patented technology for Dynamic Rule Changes, Covertix can propagate changes automatically to all the protected files.