
Achieving success depends on delivering an exceptional customer experience.
Simple, easy to use, intuitive are not just words at Côntrol™. We are committed to delivering this experience. However, sometimes things don’t go according to plan. We’re here to help.
General
What is "Military-grade" encryption?
“Military-grade” encryption typically refers to AES-256. The Côntrol application utilizes multiple types of encryption, including AES-256, to ensure your data stays in your control. This unique combination of different encryption technologies is one of the primary reasons our patent-pending data protection solution stands out in a crowd.
Why do the authorized users and I have to install software?
The only way to ensure that your data is protected and used as you wish is to keep the data contained within a safe and secure sandbox at the device level. Installing Côntrol on both ends ensures that you and more importantly the authorized users have a safe and secure place to use your data as intended. Our software is free for everyone to use regardless of the powerful features the data author chooses to enforce on authorized users with a Premium account!
Why do I need a Côntrol™ account in order to use the software?
An account enables us to verify your identity and that of all authorized recipients. Creating an account is easy – we only require an email address and a password.
How does Côntrol™ protect my data and keep it secure even after it leaves my device?
We separate access and usage rights from the data at the device level. This enables us to first verify that the individual trying to decrypt your data is an authorized user. If they are, then we enforce all usage and access rights that you selected, which ensures that authorized users can only use the data as you, the data author, choose. This process also ensures that your data never touches our servers.
What is the benefit of having an Côntrol™ Professional account?
Côntrol Premium users enjoy unlimited access to the entire data protection feature set to manage who, how, when, and where your data can be used even after it leaves your device. You will be able to manage data access rights like revoke, shred, and read receipts. Additionally, you will be able to manage usage rights like the ability to save, copy, print, forward, set access timelines, and enforce geofencing.
Can my encrypted data vault be viewed offline?
No, we need to verify the identity of every authorized user, including you the data owner, to enforce all usage and access rights every time the data is decrypted.
Can I save secure drafts and edit them later?
Yes, if you are using the Côntrol Microsoft Outlook Add-in to create new messages, simply type the message content and save it as a draft. If you’re using the Côntrol desktop and mobile applications, you will not have the option to save drafts.
Are there any limitations on how a .VGAR file can be shared digitally?
No, you can share your VGAR file the same ways you would share any other file.
Where do VGAR vaults save to on my desktop?
VGAR vaults are saved like any other file. If you prefer, you can create a special folder for all your secure vaults.
What do we mean by Zero Trust?
Zero Trust is a security concept that requires all users to be authenticated, authorized, and continuously validated before being granted or keeping access to data.
What key principles of zero-trust do I gain using Côntrol™?
Micro-segmentation of the network: Micro-perimeters are created around key network resources requiring authentication for access across each perimeter. Multi-factor Authentication: Validation of user identity from multiple simultaneous sources. Least-privilege Access/Authorization: Granting of the least level of user privilege and usage rights necessary to accomplish the user’s purpose.
What key principles of zero-trust do I gain using Côntrol™?
Micro-segmentation of the network: Micro-perimeters are created around key network resources requiring authentication for access across each perimeter. Multi-factor Authentication: Validation of user identity from multiple simultaneous sources. Least-privilege Access/Authorization: Granting of the least level of user privilege and usage rights necessary to accomplish the user’s purpose.
What is the Côntrol™ advantage?
Perpetual protection and control of data that has left your possession Platform/Domain independent Simple, intuitive user experience No key management = light and scalable deployment. Our patent pending “Transient Key” technology means that there are no keys to manage and no keys for threat actors to steal. Liability Protection: Chain-of-Custody reporting and analytics provide attestation of data protection and control even in the event of a network or system breach.
What advantages do I have with the Côntrol™ Solution?
Using a unique combination of multi-layered encryption, multi-factor authentication, geo-fencing, and Digital Rights Management (DRM) technologies, Vengar creates a micro-perimeter all the way down to individual data objects such as files. This micro-perimeter travels with the data NO MATTER WHERE IT GOES — down the street, across the country, or around the world — forever. User identity, location, and other factors are transparently verified before each and every access attempt.
Can I change my email address?
No, however, you can add as many email addresses as you like. You must have access to the email to verify that you own it.
How can I cancel my subscription?
You can cancel your account by submitting a ticket through our Support Center.
What are the differences between removing a device and disabling a device?
Disabling a device temporarily prevents anyone from being able to open a secure vault with your account on a specific device. Removing a device permanently removes it from the list of devices that are tied to your account. If you choose to add your account back to a device you previously removed it from, you will be notified via email that your account has been added to a new device.
Usage and
access
rights
What is DRM?
Data Rights Management (DRM) refers to the ability to control access to your data. It enables you to decide how, when, and where your data can be accessed by others.
What is time fencing?
Time fencing is a type of DRM that allows you to control when your data can be accessed.
What is geofencing?
Geofencing is a type of DRM that allows you to control where your data can be accessed.
What is the difference between revoke and shred?
Revoke removes access to your secure vault from all individuals that you shared it with. Shred removes access from everyone, including yourself.
What file types can you currently enforce DRM on?
We are currently able to enforce DRM on the following file types and are continuing to add support for others? .bmp, docx, .gif, .jpg, .html, .pdf, .png, .tiff, .txt
Can I make sure that the person I am sending data to doesn’t share that information with someone else?
Yes, our DRM features allow you to choose if you want to allow authorized users to copy, print, and save your data.
Can I see who, when, and where my data was accessed even if that data was shared with another individual?
Not yet, however, our development team is hard at work to show you every time your secure vault was accessed.
Why do usage and access rights not affect me?
We believe that you, as the data owner should always have access to your data; however, if you would like to permanently remove even your access to a secure vault, you can use the shred feature.
Can I selectively revoke access to secure vaults that I sent to multiple authorized recipients?
Currently, revoke works as an all-or-nothing function. If you, the data author, revoke access to a secure vault you shared with others, you are revoking access for every authorized user.
How does Côntrol™ make sure the right people have access to my data?
User identity, location, and other factors are transparently verified before each and every access attempt.
Encryption
Can I encrypt a zip file?
Yes, you can encrypt a zip file; however, we cannot enforce any usage and access rights on the files contained within the zip file.
What files types can I encrypt?
There are no limits on the types of files that can be encrypted; however, we can only enforce usage and access rights on the types of files we have viewers for.
How many files can I encrypt at one time?
There are no limits on the number of files we can encrypt at one time; however, we are limited by your computer’s storage and memory limitations.
Do I or any of the authorized users need to be online to view an encrypted file?
Yes, we use our server to verify that everyone is who they say they are and that they are using the data how, when, and where you want them to use it.
Applications
What operating systems versions will be supported?
Windows 10+ macOS X 10.14+ iOS 14+ Android 8+
Will my Côntrol™ applications automatically update?
The Côntrol application will notify you every time an update is available, and you can choose to update it whenever you like.
Is there an Outlook plugin for Mac?
Not yet, however, our developers are working hard to build one now.
Is there a way to import my contacts with out having to enter them one at a time?
Yes, you can import contacts from Microsoft Outlook.
When I create my vault in iOS or Android, where will I be able to find the file so I can send it?
iOS: Files can be accessed via the Files app on your iPhone or iPad. The quickest way to find this app is with Spotlight Search. Swipe one finger downward from the middle of the Home screen to bring up the search box, type “Files” and tap “Files” in the search results.
Why is Microsoft Outlook recommended on Windows?
The Côntrol Microsoft Windows Outlook Add-In enables you to send secure messages from the familiar Microsoft email client thereby making the best data protection solution as easy as possible.

FAQs
Get answers, now
