Scentrics enterprise security.

Data secured in a click. Mobile, scalable, compliant

Security from the Cloud

Scentrics provides security for enterprise mobiles and BYOD, by removing the cost, administrative overhead and risks associated with traditional key management solutions as well as removing the reliance on ‘walled garden’ solutions (e.g. Blackberry)

Cut Costs

Minimal upfront infrastructural and software investment. Key management costs are a fraction of client-centric encryption products.

Reduce systems administration

Centralised key management, distribution and revocation – maximum protection anywhere with minimum effort.

Guarantee compliance

Central enforcement and monitoring of regulatory, legal and policy compliant data protection as well as outside the corporate perimeter.

Send secure to any inbox

Non registered recipients can decrypt using the simple ‘in message’ sign-up link. There is no trade-off between security and agility.

Combat data-loss

Scentrics can be accessed from anywhere via a simple to download plug-in. Universal protection is afforded for the mobile enterprise.

Protect lost devices

Keys are never stored on the client device. Data on lost devices cannot be decrypted and remains secure.

Secures all messages on all devices.

BYOD protection

Secures across all mobile platforms: Android, iOS, Windows and Blackberry.

Secure all messaging

Scentrics encrypts and signs email (MS Outlook and webmail), SMS, MMS, social networks.

Scentrics’ social networks security

Moderation feature keeps you in control of your corporate social networks presence – eliminates trolling, securing your online reputation.

Secure cloud file storage

Encrypts all data and images stored in the cloud, securing your migration to the cloud.

Privacy in the public cloud

Send secure emails in public networks – one click to encrypt – secures all messages everywhere.

Anti-Malware compatible

Works with all major anti-malware solutions for seamless disinfection and prevention.

Regulatory & policy compliant security.


Centralised key management from the cloud for your global mobile workforce.

Guarantee policy compliance

TPM integration ensures integrity both inside and outside the corporate VPN. Mobility without the added risk.

Central key management

Set and monitor policy compliance for all devices wherever they are.

Key escrow feature

Legitimate corporate interception of inter-party communications made possible through the key escrow feature.

How does it work?

Encrypts email, SMS, MMS & cloud file storage

Cloud-hosted keys.

  • Server-centric key management – low cost, scalable & efficient.
  • No complicated client installation or synchronisation required.
  • No keys stored in the client results in data on lost devices stays secure.

Standards & policy compliant

  • Central policy definition and monitoring
  • Guarantees compliance inside and outside the corporate boundary

Key escrow feature

  • Ability to access encrypted corporate content when required by policy
  • Facility to intercept encrypted messages (including RIM BES) in circumstances where policy dictates

Scentrics seamless security for the agile business.

Scentrics enterprise security – Data secured in one click.

Today’s enterprise environment has become increasingly challenging to secure:

Employees are more mobile than before which results in more endpoints to manage and secure.

BYOD risk requires unified policy and heterogeneous protection.

More confidential and business critical data in the cloud means securing beyond the corporate perimeter.

Social networking as an integral component of business strategy increases exposure to security risks.

BYOD risk requires unified policy and heterogeneous protection.

More confidential and business critical data in the cloud means securing beyond the corporate perimeter.

Traditional encryption solutions require complex key management and PKI, making them costly to install and maintain.

The current heterogeneous mobile environment requires a unified and lower cost approach that addresses the increased risk of data loss. Complicated further by a cumbersome end user process and keys stored on the user device, current encryption solutions do not meet the needs of the global agile business, its mobile workforce, BYOD policy and regulatory requirements.

Scentrics’ patented key protocol is an encryption technology built for the mobile world:

Provides seamless protection of all messaging and communications: email, SMS, MMS, social networks, cloud file storage.

Seamless across all devices – mobile and desktop and on all email clients and mobile operation platforms.

Provides security of content across all devices and to the devices themselves.

Data remains inaccessible on the lost device – removing the risk of data-loss.

Offers true non-repudiation and complies with the regulatory requirements.

Keys managed from the cloud significantly reduces administration and cost.

Scentrics is truly SaaS compliant. Integrates with all major anti-malware applications to protect and read across all applications.

Built with the mobile device in mind – just one click to encrypt across all applications.

Watch the video