Through Trivalent’s leading-edge encryption and file shredding technology, Trivalent Protect enables users to securely store data on their devices (laptops, handhelds, notebooks, mobile devices) to ensure critical data remains secure in the file system. Trivalent Protect integrates seamlessly and compliments existing security technologies.
Both at rest and runtime.
Only authorized users can access their secured data.
Integrates seamlessly with existing IT infrastructures.
Data is transformed and rendered useless to unauthorized users.
Supports HIPAA and PCI-DSS compliance mandates.
Comprehensive bit-level data protection, beyond full-disk encryption.
Centrally configures and manages keys, user authentication into Trivalent Protect, licensing and data protection configuration settings.
Intercepts specified file types and application data. It then sends them to the encryption engine to be split and saved in a specialized file system.
Managed by the Windows kernel driver or Android FUSE; allows for the storage of encrypted and shredded data.
The Trivalent Configuration Manager (TCM) is a web-based application that is delivered as a Virtual Appliance and integrates into Active Directory or LDAP. The TCM enables admins to create Trivalent Protect configurations, save, and generate install packages for Windows and Android.
Learn about our unique process of encryption, data shredding, and secure storage that renders the data completely unusable and unrecoverable to anyone but an authorized user.