Did you know that 44% of all people access their personal and professional emails through non-secure environments?
A complete messaging system for secure information exchange between users, groups and businesses, while ensuring that shared data has total privacy.
Senders and receivers can be secure in the knowledge that their messages will not be tampered with between source and destination. Don’t take any risks!
FILES, DOCUMENTS AND SPREADSHEETS
Did you know that 35% of global companies have already been the victim of cybercrime?
Create, edit, store and share electronic files, documents and spreadsheets within a fully encrypted environment, without the need for any type of desktop application.
ENCRYPTED CHAT SESSIONS
Did you know that 72.3% of all corporate chat programs are used for sharing professional information?
Talk with users, create groups and instantly share information without leaving any traceable signs on computers and/or mobile devices. Decisions at your finger-tips, with absolute privacy and the highest levels of encryption.
COMMUNICATION IN REAL TIME
Did you know that 30% of mobile phones around the world are illegally tapped?
Make individual calls and conference calls in a completely private corporate environment. Discuss your projects with teams, consultants and outsourcers in any location, with absolute certainty that your communications are not subject to data leakage. The digital world is insecure, but your information deserves to be preserved!
MEETINGS INSIDE VAULTS
Did you know that executives spend almost 40% of their time on business trips?
Hold your meetings inside virtual vaults.
Increase the efficiency of your business, reduce costs and speed up the decision-making process in a completely private environment, with no risks to your business. In a fully connected and mobile world all companies require technological solutions that provide their executives with increasingly effective environments for resolving their business affairs.
Did you know that businesses lost approximately $ 110 billion dollars in cybernetic fraud in 2014?
Create, edit and delete users and groups; define access and user profiles; and facilitate the management of users with an easy-to-use and integrated administrative console.
ENJOY YOUR PRIVACY WHEREVER YOU ARE
MODERN AND RAPID INTERFACE
A design and interface module created to facilitate your everyday life.
ACCESS BY MULTIPLE DEVICES
Work wherever you are and on as many devices as you need.
SYNCHRONIZE ALL DEVICES
Access, share and store your information utilizing various devices.
INFRASTRUCTURE IN THE CLOUD
Public or Private Cloud. High availability and performance, either on our very own servers or our servers distributed around the world.
Stay in touch and receive notifications on your mobile and desktop devices with absolute privacy
EXPIRY DATE RESOURCE
Define expiry dates for your messages, documents and groups and reduce the possibility of data leaks for everyone involved.
We have experience with the most complex government, banking and multinational projects.
COST OF CORPORATE DATA LEAKS (2014)
WE BELIEVE IN THE PRIVACY OF YOUR COMMUNICATIONS
SOLUTION WITH HIGH LEVELS OF ENCRYPTION
We use high level encryption aimed at ensuring the integrity of your communications and stored data.
No information is created, transferred or stored without first being encrypted at high level.
DATA SECURITY, COMPLIANCE AND RISK CONTROL
Your business moves rapidly along many paths across the world. Businesses need control and protection of their sensitive data without affecting their commitment in being able to provide mobility and productivity. Our commitment is to provide this service in a single and integrated environment.
MULTIPLE AUTHENTICATION FACTORS
We utilize what the user knows (email and password) and what the user has (token and mobile phone), thereby guaranteeing the source and destination security of all communications.
HIGH AVAILABILITY, FULL BACKUP AND NO BACKDOOR VULNERABILITY
We utilize cloud-based servers distributed around the world with high data availability, advanced backup policies and, most importantly of all, absolutely no possibility of third-parties gaining access to your information. Everything is encrypted!
One of our commitments is the holding of a continuous Bug Bounty program. Contact us for more information: email@example.com
Define who can see, edit, download, print and share information, with inclusion of self-destruction resources.
THE POWER TO BUILD A SUCCESSFUL RELATIONSHIP FOR CUSTOMERS WITH RESELLERS & PARTNERS
The success of Resellers and Partners determines our own success, and for this reason we work together to meet the demand of a growing number of new customers and keep them satisfied.
“After you lose your privacy, you realize you have lost something extremely valuable.”
There are 3 (three) quick and easy steps. As follows:
1) Register your user-name on the web
Insert the web-user registration link (get it from Alexandre Frias and/or Regis)
2) Download the installer. Click here to download
3) Install Sikur on a computer
Use the install wizard. The install wizard will start the download of the necessary files.
You can carry out this procedure on any computer.
Our team of specialists are ready to attend to your needs through the following access channels:
- E-mail: firstname.lastname@example.org
- Telephone: +55 11 3230-SAFE (or +55 11 3230 7233)
Sikur brings together a series of security processes on a single platform, utilizing high level encryption (3DES 168- bit symmetric encryption, Rijndael 256-bit encryption and RSA-2048 bit, RSA 4096-bit asymmetric Encryption) which are 20 times more secure than used in banking transactions. Sikur does not permit screen capture and impedes the use of Key Logger, with all information being stored on a network of 24 servers distributed around the world.
Encryption is a set of techniques for concealing information from unauthorized access. The purpose of encryption is to transform a set of legible information such as the contents of an email, for example, into a jumble of characters which are impossible to comprehend. The key concept is that only the encryption key holder is able to restore this email back to its legible format. Even though the entire data concealment and recovery process may be known, unauthorized parties cannot view the unencrypted information without the decryption key.
No. Sikur has been designed to eliminate backdoor vulnerabilities. We are committed to protecting the privacy of our customers and therefore preventing anyone from accessing or reading the conversations between out users.
Operating System: Microsoft Windows 2000/2003, Windows 7 and Windows 8. Both 32 & 64-bit Microsoft versions. NET Framework 4.0 or more up-to-date version
Minimum resolution: 1024×768
No. We are able to guarantee the security and privacy of your messages when transferred within a totally encrypted and secure environment, but we are not able to guarantee the security of your messages when used in non-secure environments such as with email programs, text editors and/or non-protected computers.
We have prepared a pricing model that meets the needs of all enterprises, from large multinational companies to small businesses, with special deals for each type of company profile, business scale and number of users.
We are committed to serving you by means of our business and pre-sales teams located in 4 (four) continents, for the preparation of proposals that preserve your greatest asset, your information.
We are a multinational group with accumulated experience over more than 10 (ten) years on complex security projects for Governments, Banks and Multinational Corporations, and now leading the way in secure state-of-the-art communications for everyone.
With offices in more than 10 (ten) locations, our specialized teams are waiting to serve your needs and resolve your secure communication and collaboration problems.
FIND OUT MORE ABOUT OUR SOLUTIONSFind out more about the solutions developed to protect and preserve your information.
PRIVACY ABOVE ALL
Receive updates by Email
We never distribute junk email or spam