top of page
background-hero-640.png

RESOURCE CENTER

Stay informed with whitepapers, videos, and FAQs.

Whitepapers

LLM Whitepaper Cover.png

Navigating the AI Gold Rush: Protecting sensitive data used for and by LLMs

Karim Eldefrawy

Feb 2024

protecting-sensitive-data-with-policy-based-selective-encryption.png

Protecting Sensitive Data with Policy-Based Selective Encryption

Karim Eldefrawy

Feb 2023

the-next-frontier-of-data-loss-protection.png

The Next Frontier of Data Loss Protection

Karim Eldefrawy

Feb 2023

background-right-1800.png

Videos

Using Confidencial with
Microsoft Word

In this video, we'll show you how easy it is to secure sensitive information within a Microsoft Word document using...

Confidencial's Cloud Protector:The latest innovation in protecting cloud storage

In this video, we'll introduce you to Confidencial's Cloud Protector. Cloud protector is designed to allow you to search...

Why you should use Encryption vs Redaction to secure sensitive information!

Why you should use Encryption vs Redaction to secure sensitive information! Try Confidencial for yourself. Click here to get...

PDF Selective
Protection

Learn how to protect sensitive information with a PDF file. Protect the entire PDF file, or secure portions of the file...

Confidencial's Secure Document Request - A secure way to request sensitive documents

Confidencial's Secure Document Request (SDR) provides a secure method for requesting sensitive documents from...

10 Reasons to
use Confidencial

10 Reasons to use Confidencial Try Confidencial for yourself. Click here to get started...

Protecting the
Puzzle Pieces

Every year organizations spend millions on cybersecurity to build perimeter defenses around their sensitive information...

Securing your sensitive information with Confidencial

Unencrypted data is the most prevalent root cause of data breaches, regardless if that information was compromised...

background-left-650.png

FAQ

  • Do I need to install separate add-ins for Word and Excel?
    No, there is no need to install one add-in for Word then install the add-in again for Excel. Simply install one add-in and start using Confidencial's document protection capabilities in both Word and Excel.
  • Do users in my organization have to create new passwords with Confidencial?
    No. If an enterprise administrator creates an enterprise/organization account on Confidencial, they can enroll users in their enterprise using its Active Directory (AD) accounts into Confidencial. This is accomplished by creating a connection between Confidencial and the organization's AD to redirect signup requests to AD. However, this option is not available if users are enrolled in the public space via individual accounts.
  • Can I encrypt to users registered with Confidencial but outside my organization?
    Yes. The encryption experience is the same for users inside and outside your organization. This is assuming that your organization's administrator allows users inside it to encrypt to users outside the organization (whether to users registered in other organizations or registered in the public space using individual accounts).
  • Can I encrypt to users not registered with Confidencial?
    Yes. You can utilize Confidencial’s escrowed key service and generate one-time-use keys that are utilized to encrypt documents to unregistered users. This happens automatically when you encrypt to an unregistered user. You can then send the encrypted documents to the users via email, Slack, cloud storage, or any other method of choice. Confidencial does not obtain the encrypted documents. When the intended user receives the document (or email) they are redirected to Confidencial to register and install the add-ins and the documents will then be decrypted automatically. In the future any encryption to the new users will use their long-term privately generated keys which will be generated when they complete their registration.

With Confidencial, your data isn't just safe. It's a catalyst for transformation.

Unstructured data security n for advanced data protection
End-to-end encyrption for advanced data protection
bottom of page