Home

Protect yourself with Confinet® and a comprehensive approach to cybersecurity

Confinet® Certified by Leading Security Services Firm

What is Confinet

Confinet is an innovative security software product suite that has been designed and developed to allow the members of an organization to create, manage, protect, and share confidential information and intellectual property in a secure manner.

Why should your organization use Confinet?

  • You need to protect information with powerful access controls
  • You need to protect information with strong cryptography
  • You need to be able to securely communicate with anyone
  • You need comprehensive protection for information
  • You must satisfy complex auditing requirements
  • You need to protect users from malware
  • You want to reduce spam

You need to protect information with powerful access controls

Powerful access controls allow precise control over the following:

  • Who has access to information
  • How information can be accessed
  • When information can be accessed
  • How long information can be accessed
  • Expiration dates for information access

You need to protect information with strong cryptography

Confinet encrypts all communication in accordance with the SSL/TLS protocols; in addition, Confinet employs an industry standard mode of encryption that can detect when transmitted information has been tampered with.

You need to be able to securely communicate with anyone

All of our hosted offerings feature the ability to create an unlimited number of accounts for use by your organization. After account creation, users can freely download the Confinet client and log in with the credentials your Confinet administrator has established for them.

In addition to creating accounts for the members of your organization, feel free to create accounts for your clients, partners, vendors, distributors, affiliates, or anyone else you need to communicate with in a secure manner.

You need comprehensive protection for information

Confinet is a comprehensive product suite that provides users with everything they need to create, manage, protect, and share confidential information and intellectual property.

As such, Confinet does not make any use of, or need, third party applications that may handle information in an unsafe or insecure manner.

You must satisfy complex auditing requirements

Your Confinet administrator can enable detailed auditing on a per-user basis in order to satisfy complex auditing requirements.

On Windows, audit events generated by the Confinet Client and Confinet Administrator applications can be viewed with the Windows Event Viewer; on Mac OS X, these events can be viewed with the Console application.

When enabled, Confinet generates audit events using the Common Event Format (CEF); a standard event format that can be consumed by many security information and event management (SIEM) products (including Splunk, ArcSight, and many other SIEM products).

You need to protect users from malware

The Confinet product suite does not expose users to emails or files (the primary sources of almost all malware) because it does not make use of, or rely upon, email or files.

Instead, information created by Confinet users is stored in a centralized database in the cloud on a database server behind an ultra-secure firewall with multiple layers of protection.

You want to reduce spam

Confinet allows users to freely send messages to each other; however, only an individual with an account on your Confinet server can send messages to your Confinet users.

This is in contrast to traditional email, where anyone can send email to your users (including email containing dangerous malware attachments).

Visit our offerings page to see if one of our hosted solutions suits your needs.

Please contact us if you would like to run a Confinet server in your own cloud environment (or on your corporate LAN); we would be happy to design a custom installation tailored to meet your specific needs.