Overview
Quick start: what Côntrol is, how it works, and what controls you can enforce.
Solution Overview
Built on Zero Trust principles and strong modern encryption, Côntrol helps data owners keep control across the lifespan of the data. Côntrol is a file sharing approach designed to keep control with the data owner—not the storage provider. That means not only can Côntrol users determine who can access their data, when and where they can access it, but they can also determine for how long. The data owner (or user) can decide to revoke or restrict the data even after it has been distributed. Even if content is forwarded through email, chat, or shared drives, access can be revoked if it remains inside a Côntrol-protected container.
Côntrol empowers individuals and organizations (large and small) with unmatched control over their data inside and outside of their network – from source to endpoint. And, unlike other market solutions, neither DataRock nor Côntrol ever accesses or stores user data.
Access Rights. Usage Rights. Revocation Rights. Côntrol: Ultimate data privacy, on your terms.
System Requirements
The minimum system requirements needed to run Côntrol can be found below. For the best experience, we always recommend using the latest publicly available versions of each operating system (OS).
​
Desktop
-
Windows
-
Windows 10+​
-
.NET Framework 4.6+
-
-
Apple
-
macOS 10.14+
-
Mobile
-
iOS
-
iOS 14+
-
-
Android
-
Android 8+
-
Add-ins
-
Outlook for Windows
-
Windows 10+
-
.NET Framework 4.6+
-
Outlook 2013+
-
-
Outlook for MacOS
Web browser
-
Chrome 89+
-
Edge 89+
-
Firefox 87+
-
Safari 14.1+
Account Creation & Management
Users must create an account to use the Côntrol data protection solution.
Account Creation
Creating an account can be done within the Côntrol applications and only requires an email address and password.
Account Management
Users can choose to login to their account manually or automatically when the application is started. Users must be logged in to encrypt and decrypt secure containers.
User Rights
Usage rights enable data authors to manage how their data is used by authorized users after a secure container has been decrypted. Not available for Standard accounts.
Save
Enables data authors to prevent authorized users from saving decrypted data.
Print
Enables data authors to prevent authorized users from printing decrypted data. Preventing printing also prevents authorized users from saving.
Copy
Enables data authors to prevent authorized users from copying decrypted data. Preventing copying also prevents authorized users from printing and saving.
Forward
Enables data authors to prevent authorized users from forwarding decrypted data to others. Preventing forwarding also prevents authorized users from copying, printing, and saving. Only available for Microsoft Outlook Add-in.
Access Times
Access timeline enables data authors to manage when their data can be decrypted by authorized users. Not available for Standard accounts.
Start Time
Enables data authors to prevent authorized users from decrypting data before a specific date and time.
End Time
Enables data authors to prevent authorized users from decrypting data after a specific date and time.
Contact & Group Management
Lists for contacts and groups help data authors easily manage who has access to their data containers. Not available for Microsoft Outlook Add-in.
Contacts
The contact management section allows users to create, edit, and delete contacts.
Groups
The group management section allows users to place multiple contacts into groups, which make sending emails to multiple individuals much easier.
Web Portal
The user portal shows data specific to an individual account.
Dashboard
The dashboard chart shows the number of encryptions and decryptions that a user has done over the last 90 days.
Profile
The profile page contains user specific data such name, company, country, license details, roles and status. A user can also reset their password.
Devices
Users can view and manage the devices associated with their Côntrol account. They can check the date the device was added and the device status. In addition, users can temporarily block, allow, or completely remove devices from their account.
Administrative Portal
The administrative portal enables company, reseller, and system administrators to access and manage their accounts.
Company List
The companies list shows all the companies that a user can manage. Only available to reseller and system administrators.
Dashboard
The company dashboard shows a chart detailing the number of encryptions and decryptions that all the users have done over the last 90 days. Additionally, the number of licensed, unlicensed, and pending accounts are shown.
Details
The company details page contains company specific data such name, type, address, and license details.
Users
The users page shows all the users that belong to a company.
Reports
The usage report details the number of encrypts and decrypts performed by each user over a specific date range.






