top of page
EBI-Light-Background-944x2048.jpg

Achieving success depends on delivering an exceptional customer experience.

Simple, easy to use, intuitive are not just words at Côntrol.  We are committed to delivering this experience.  However, sometimes things don’t go according to plan.  We’re here to help.

Solution 
Overview

Built on ‘Zero Trust’ principles and NSA-Approved Commercial Level Encryption,  Côntrol is the only file sharing solution on the market that gives the data owner complete control across the lifespan of the data. That means not only can Côntrol users determine who can access their data, when and where they can access it, but they can also determine for how long. The data owner (or user) can decide to revoke or restrict the data even after it has been distributed. Even if a user has sent pictures, files or a message via email or even WhatsApp to someone else, and that data is on someone else’s system, access can be revoked by the user at any time.

Côntrol empowers individuals and organizations (large and small) with unmatched control over their data inside and outside of their network – from source to endpoint. And, unlike other market solutions, neither DataStone or Côntrol ever accesses or stores user data. Access Rights. Usage Rights. Revocation Rights. Côntrol:  Ultimate data privacy, on your terms.

System
requirements

The minimum system requirements needed to run Côntrol can be found below. For the best experience, we always recommend using the latest publicly available versions of each operating systems (OS).

​

Desktop

  • Windows

      Windows 10+​

      .NET Framework 4.6+

  • MacOS

      OS X 10.14+

Mobile

  • iOS

      iOS14+

  • Android

      Android 8+

Add-ins

  • Outlook for Windows

      Windows 10+

      .NET Framework 4.6+

      Outlook 13+

Web browser

  • Chrome 89+

  • Edge 89+

  • Firefox 87+

  • Safari 14.1+

Account
creation &
management

Users must create an account to use the Côntrol data protection solution.


Account Creation
Creating an account can be done within the Côntrol applications and only requires an email address and password.


Account Management
Users can choose to login to their account manually or automatically when the application is started. Users need to be logged into their accounts in order encrypt and decrypt secure containers.

User rights

Usage rights enable data authors to manage how their data is used by authorized users after a secure container has been decrypted. Not available for Standard accounts.


Save
Enables data authors to prevent authorized users from saving decrypted data.


Print
Enables data authors to prevent authorized users from printing decrypted data. Preventing printing also prevents authorized users from saving.


Copy
Enables data authors to prevent authorized users from copying decrypted data. Preventing copying also prevents authorized users from printing and saving.


Forward
Enables data authors to prevent authorized users from forwarding decrypted data to others. Preventing forwarding also prevents authorized users from copying, printing, and saving. Only available for Microsoft Outlook Add-in.

Access times

Access timeline enables data authors to manage when their data can be decrypted by authorized users. Not available for Standard accounts.

Start Time
Enables data authors to prevent authorized users from decrypting data before a specific date and time.


End Time
Enables data authors to prevent authorized users from decrypting data after a specific date and time.

Contact & 
group
management

Lists for contacts and groups help data authors easily manage who has access to their data containers. Not available for Microsoft Outlook Add-in.

Contacts
The contact management section allows users to create, edit, and delete contacts.


Groups
The group management section allows users to place multiple contacts into groups, which make sending emails to multiple individuals much easier.

Web portal

The user portal shows data specific to an individual account.

Dashboard
The dashboard chart shows the number of encryptions and decryptions that a user has done over the last 90 days.


Profile
The profile page contains user specific data such name, company, country, license details, roles and status. A user can also reset their password.


Devices
Users can get a list of all the devices that have been used with EB Control data protection solution. They can check the date the device was added and the device status. In addition, users can temporarily block, allow, or completely remove devices from their account.

Administrative
portal

The administrative portal enables company, reseller, and system administrators to access and manage their accounts.

Company List
The companies list shows all the companies that a user can manage. Only available to reseller and system administrators.


Dashboard
The company dashboard shows a chart detailing the number of encryptions and decryptions that all the users have done over the last 90 days. Additionally, the number of licensed, unlicensed, and pending accounts are shown.


Details
The company details page contains company specific data such name, type, address, and license details.


Users
The users page shows all the users that belong to a company.


Reports
The usage report details the number of encrypts and decrypts performed by each user over a specific date range.

Purple_arrow.png

Overview

Solutions overview

bottom of page