top of page

When the locks fail, protect what is inside the door.

Businesses and corporations spend millions every year on perimeter defenses to protect their sensitive information. Yet, intellectual property and customer PII continue to be targeted by cybercriminals, insider threats, as well as unintentional exposure by well-meaning employees.

In February there were 106 publicly disclosed incidents accounting for 29.5 million records being breached. Added to the 277.6M records breached in January, the first two months of 2023 have resulted in over 300 million records being breached.

It’s time for organizations to focus on securing the individual information assets they possess and stop believing that metaphorically securing the doors with bigger and more expensive locks will protect what is inside.

In today’s world, it’s not a question of ‘if’ your organization will experience a costly and embarrassing data breach, but rather ‘when’ that breach will occur. The smart move is to ensure that when that information is breached, it is useless to anyone other than its intended recipients.

However, many view this type of approach as disruptive to existing business processes, creating more work, and thereby having a negative impact both on productivity and customer satisfaction. That feeling is understandable as most solutions today force you to secure and distribute sensitive information through a dedicated portal taking you out of your normal work patterns.

Here is a typical problematic scenario:

  • You create a document in Microsoft Word with sensitive information that must be distributed to three individuals, but each individual is only authorized to view a specific portion of the document.

  • You must first upload the document to a proprietary portal.

  • From that location, you secure the contents of the document so that the first recipient can only see what they are authorized to see.

  • You then notify the first recipient that a document exists within the portal.

  • A second notification is sent to the first recipient providing them with the credentials they need to access the document.

  • The recipient is forced to go to the portal and log in with the provided credentials in order to view the document.

  • You must then repeat this process for each additional recipient who requires a unique view of the document, ultimately creating and distributing three versions of the same document.

Confidencial was designed from the ground up to eliminate this cumbersome process.

With Confidencial you secure your document directly from within your desktop application such as Microsoft Word. You have the option to secure the entire document or secure specific sections of the document that only individuals you authorize can access. Then, you simply save and distribute the document as you do today. There is no jumping between tools or portals; no proprietary storage, no sending unsecured credentials to recipients, and no need to create multiple versions of the same document.

All of your requirements for the secure creation, storage, and distribution of sensitive information are met within a single copy of the document, with little to no disruption to your existing work processes.

Should any document become compromised through malicious or accidental actions such as a data breach or simply emailing a document to the wrong email address, all secured information remains unreadable to anyone other than the intended recipients.

Confidencial delivers a simple, safe, secure, and affordable solution for protecting sensitive information at its source ... within the document itself.

Confidencial recently announced the availability of its public beta. You are invited to take advantage of this opportunity to see how Confidencial is changing the way individuals and organizations protect sensitive information.

Visit us at and experience it for yourself for free.

13 views0 comments


bottom of page