mockup-01

1

SECURE MESSAGES

Did you know that 44% of all people access their personal and professional emails through non-secure environments?

A complete messaging system for secure information exchange between users, groups and businesses, while ensuring that shared data has total privacy.
Senders and receivers can be secure in the knowledge that their messages will not be tampered with between source and destination. Don’t take any risks!

REQUEST A DEMONSTRATION

2

FILES, DOCUMENTS AND SPREADSHEETS

Did you know that 35% of global companies have already been the victim of cybercrime?

Create, edit, store and share electronic files, documents and spreadsheets within a fully encrypted environment, without the need for any type of desktop application.

REQUEST A DEMONSTRATION

3

ENCRYPTED CHAT SESSIONS

Did you know that 72.3% of all corporate chat programs are used for sharing professional information?

Talk with users, create groups and instantly share information without leaving any traceable signs on computers and/or mobile devices. Decisions at your finger-tips, with absolute privacy and the highest levels of encryption.

REQUEST A DEMONSTRATION

4

COMMUNICATION IN REAL TIME

Did you know that 30% of mobile phones around the world are illegally tapped?

Make individual calls and conference calls in a completely private corporate environment. Discuss your projects with teams, consultants and outsourcers in any location, with absolute certainty that your communications are not subject to data leakage. The digital world is insecure, but your information deserves to be preserved!

REQUEST A DEMONSTRATION

5

MEETINGS INSIDE VAULTS

Did you know that executives spend almost 40% of their time on business trips?

Hold your meetings inside virtual vaults.
Increase the efficiency of your business, reduce costs and speed up the decision-making process in a completely private environment, with no risks to your business. In a fully connected and mobile world all companies require technological solutions that provide their executives with increasingly effective environments for resolving their business affairs.

REQUEST A DEMONSTRATION

6

ADMINISTRATIVE CONSOLE

Did you know that the businesses lost approximately $ 110 billion dollars in cybernetic fraud in 2014?

Create, edit and delete users and groups; define access and user profiles; and facilitate the management of users with an easy-to-use and integrated administrative console.

REQUEST A DEMONSTRATION

ENJOY YOUR PRIVACY WHEREVER YOU ARE

MODERN AND RAPID INTERFACE

A design and interface module created to facilitate your everyday life.

ACCESS BY MULTIPLE DEVICES

Work wherever you are and on as many devices as you need.

SYNCHRONIZE ALL DEVICES

Access, share and store your information utilizing various devices.

smartphone

INFRASTRUCTURE IN THE CLOUD

Public or Private Cloud. High availability and performance, either on our very own servers or our servers distributed around the world.

NOTIFICATIONS

Stay in touch and receive notifications on your mobile and desktop devices with absolute privacy

EXPIRY DATE RESOURCE

Define expiry dates for your messages, documents and groups and reduce the possibility of data leaks for everyone involved.

TRY SIKUR FOR FREE

REQUEST A DEMONSTRATION

0

YEARS OF EXPERIENCE

WHAT WE DO

We work to protect your privacy and security in the digital world.

ABOUT US

We have experience with the most complex government, banking and multinational projects.

0

COST OF CORPORATE DATA LEAKS (2014)

0

TEAM NATIONALITIES

OUR LOCATIONS

USA, Latin America, Europe and the Middle East. Three development centers

CONTACT US

Our global team is waiting to assist you. Get in touch!

0

OFFICES AROUND THE WORLD

WE BELIEVE IN THE PRIVACY OF YOUR COMMUNICATIONS

SOLUTION WITH HIGH LEVELS OF ENCRYPTION

We use high level encryption aimed at ensuring the integrity of your communications and stored data.
No information is created, transferred or stored without first being encrypted at high level.

DATA SECURITY, COMPLIANCE AND RISK CONTROL

Your business moves rapidly along many paths across the world. Businesses need control and protection of their sensitive data without affecting their commitment in being able to provide mobility and productivity. Our commitment is to provide this service in a single and integrated environment.

MULTIPLE AUTHENTICATION FACTORS

We utilize what the user knows (email and password) and what the user has (token and mobile phone), thereby guaranteeing the source and destination security of all communications.

HIGH AVAILABILITY, FULL BACKUP AND NO BACKDOOR VULNERABILITY

We utilize cloud-based servers distributed around the world with high data availability, advanced backup policies and, most importantly of all, absolutely no possibility of third-parties gaining access to your information. Everything is encrypted!

TRANSPARENCY

One of our commitments is the holding of a continuous Bug Bounty program. Saiba mais

ACCESS PERMISSIONS

Define who can see, edit, download, print and share information, with inclusion of self-destruction resources.

picture-012

THE POWER TO BUILD A SUCCESSFUL RELATIONSHIP FOR CUSTOMERS WITH RESELLERS & PARTNERS

separator-200

The success of Resellers and Partners determines our own success, and for this reason we work together to meet the demand of a growing number of new customers and keep them satisfied.

Sikur Channel Program

“After you lose your privacy, you realize you have lost something extremely valuable.”

How do I install Sikur?

There are 3 (three) quick and easy steps. As follows:

1) Register your user-name on the web
Insert the web-user registration link (get it from Alexandre Frias and/or Regis)

2) Download the installer. Click here to download

3) Install Sikur on a computer
Use the install wizard. The install wizard will start the download of the necessary files.

You can carry out this procedure on any computer.

How do I get in touch with Sikur Technical Support?

Our team of specialists are ready to attend to your needs through the following access channels:

What are the security layers?

Sikur brings together a series of security processes on a single platform, utilizing high level encryption (3DES 168- bit symmetric encryption, Rijndael 256-bit encryption and RSA-2048 bit, RSA 4096-bit asymmetric Encryption) which are 20 times more secure than used in banking transactions. Sikur does not permit screen capture and impedes the use of Key Logger, with all information being stored on a network of 24 servers distributed around the world.

What is Encryption?

Encryption is a set of techniques for concealing information from unauthorized access. The purpose of encryption is to transform a set of legible information such as the contents of an email, for example, into a jumble of characters which are impossible to comprehend. The key concept is that only the encryption key holder is able to restore this email back to its legible format. Even though the entire data concealment and recovery process may be known, unauthorized parties cannot view the unencrypted information without the decryption key.

Are there any Sikur Backdoor Vulnerabilities?

No. Sikur has been designed to eliminate backdoor vulnerabilities. We are committed to protecting the privacy of our customers and therefore preventing anyone from accessing or reading the conversations between out users.

What is the minimum configuration for the installation and operation of Sikur?

Operating System: Microsoft Windows 2000/2003, Windows 7 and Windows 8. Both 32 & 64-bit Microsoft versions. NET Framework 4.0 or more up-to-date version
Minimum resolution: 1024×768

Can I send messages to people that don't have Sikur?

No. We are able to guarantee the security and privacy of your messages when transferred within a totally encrypted and secure environment, but we are not able to guarantee the security of your messages when used in non-secure environments such as with email programs, text editors and/or non-protected computers.

How do I receive more technical information?

Download our WhitePaper and/or request a web-meeting with our team of specialists by clicking here.

How is Sikur priced?

We have prepared a pricing model that meets the needs of all enterprises, from large multinational companies to small businesses, with special deals for each type of company profile, business scale and number of users.
We are committed to serving you by means of our business and pre-sales teams located in 4 (four) continents, for the preparation of proposals that preserve your greatest asset, your information.

Who created Sikur?

We are a multinational group with accumulated experience over more than 10 (ten) years on complex security projects for Governments, Banks and Multinational Corporations, and now leading the way in secure state-of-the-art communications for everyone.
With offices in more than 10 (ten) locations, our specialized teams are waiting to serve your needs and resolve your secure communication and collaboration problems.

PRIVACY ABOVE ALL

Receive updates by Email

 

We never distribute junk email or spam