Secure X-Change is a revolutionary application employing the highest standards of data encryption technology providing both global and local secure file transfer. Secure X-Change’s ground breaking architecture and public key infrastructure ensures data integrity, confidentially and availability at all times.
Point to point SSL (Secure Sockets Layer) file transfer coupled with Public Key infrastructure ensures not only secure point to point delivery but also protected local data storage. Public Key Infrastructure adds an additional layer of access control by validating the authenticity of data recipients thus upholding data confidentiality and integrity.
The unique Secure X-Change architecture works behind the scenes to provide both online and offline data protection. All processes are completely transparent to the user yet ensuring only the highest level of data integrity. Windows explorer integration allows convenient data navigation and easy accessibility.
- SSL Encrypted File Transfer
- Encrypted Data Storage
- Public Key Infrastructure
- Windows Explorer Integration
- Configurable User Permissions
- Remote Server Management
- Easy Deployment
- Extensive System Logging
- User Disk Space Allocation
- Advanced Encryption Standard (AES)
- Multiple Server Support
In Summary Secure X-Change Provides For
Ease of Management
- Allows the user to centrally manage and configure all files or data exchanges within and outside your organization.
Secure X-Change secures the communication channels used in the transport of data by:
- Securing the transfer using SSH and SSL standards
- Supports PKI
- Access rights control with user id and password requirements
- Encryption of files with dual password control capability
Apart from proprietary protocols, other standard transport methods supported include FTP and SMTP
Compression and encryption
Automatically reduce the size of files and data transmitted by compression and increases the security of the file transfer by encryption.
Secure X-Change has a built in capability to automatically resume file transfers that are interrupted during transmission. It allows the user to define the number of retries and provides a log for all failed transfers.
Provides the flexibility to the user to automate the file transfer process via a predefined work flow. Transfers of files can be configured to be fully automated without having to wait for schedules or manual intervention.
Logging and Auditing
All files transfers are logged and thus provides your organization an audit trail of all data exchanges within and outside organization. Instant e-mail notification is feature that is available too.