Support Center

In-Place Protection; Protecting SSH Keys

Last Updated: Mar 20, 2019 08:48AM PDT
February 12th, 2017 - Protecting SSH Keys While You Use Them w/ In-Place Encryption

File encryption software has traditionally been cumbersome to use, and has seldom been useful against the host threat. For an attacker, all he or she needs to do is wait around someone to Login and unlock their archive before making off with all the, "protected" data and decryption keys. SSProtect changes this, using a non-intrusive form of data encryption that not only retains native application workflows, but stops localhost attackers in their tracks.

Contact Us
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
Invalid characters found