Cypherdog Encryption Business
 

How the Business version differs from the Single User version

  • management of user’s domains
  • management of user’s private keys
  • management of user(s)
  • automatization of installation user’s App
  • no e-mail aliases (user has only one e-mail)
  • automated backup of private keys to Vault only (no user’s backup to any file)
  • scalable command line text/file encryption/decryption
  • cooperation with security systems on gateway
parallax background

Components of the Business version


 
Admin Panel
  • ability to add administrators
  • ability to add allowed domains
  • ability to add, remove, deactivate users
  • setting the URL of a Proxy Server
  • checking private keys integrity
  • generating a configuration file for adding and configuring user accounts
  • recovering private keys from Vault for accessing to encrypted employees’ content and files
Vault Server
  • Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing
  • ability to use any, but we recommend Hashi Corp
  • Cypherdog uses Vault for storing private keys of users
  • Vault Server is separated from the Internet, so Cypherdog uses Proxy Server
Proxy Server
  • server application that acts as an intermediary between a client requesting a resource and the server providing that resource
  • ability to create https connections between user applications, Admin Panel and Vault Server
  • securing connections between components of the Cypherdog solution
CMD Service/Plugin
  • backups the user's private key for restoration and monitoring purposes
  • enables the use of the command line to enable batch processing
  • enables monitoring of all encrypted outbound and inbound traffic on the gateway