DecryptNaBox Integrated Components

Improve Decryption with DecryptNaBox Components

Discover helpful components you can add on to DecryptNaBox

The DecryptNaBox platform includes many components that add functionality, ensure compliance to key regulations, and increase automation.


DecryptNaBox platform includes many components that can enhance the product usage, ensure compliance, and add automation. At the heart of DecryptNaBox Technology is Key Decrypt Server. The Key Decrypt Server is a secure private key vault that can integrate with associated Certificate Authority to pull required private keys as needed. It provides DecryptNaBox clients with service such as Session Key Decryption and Header Modification. Clients will be able to use such services instead of relying on locally available keys.

Book a Demo

KeyDecryptServer

KeyDecrypt provides comprehensive capabilities for key management, key extraction and migration, key protection, message session key decryption, and service management. By using modular adaptors, KeyDecrypt is configured to communicate securely with different types of key repositories, such as Microsoft and Entrust Certificate Authorities (CAs).

Security & Compliance

KeyDecrypt offers advanced key protection supporting Hardware Security Module (HSM) technology for key storage and handling, which ensures the solution meets FIPS 140-2 level 2/3 requirements. KeyDecrypt also certifies the integrity of the audit logs, and data transmitted between components of the integrated solution are protected by multi-layer encryption.

Automated Key Recovery

KeyDecrypt provides a message session key decryption service (SKDS) to other DecryptNaBox clients that eliminates the need for manual key recovery. The DataDecrypt component extracts the encrypted session keys from email message headers and sends them to the SKDS, which utilizes HSM-protected user private keys to decrypt session keys and messages.

Components of KeyDecrypt

Key Management Service: allows the system to store and protect keys in a Key Vault, which can optionally utilize HSM technology.

Key Migration Tool (KMT): allows customers to extract certificates and keys from one source and securely import them to the Key Vault. This allows keys and certificates to be selected and made available to DecryptNaBox.

CA Communication Service: allows the system to dynamically import keys from the Certification Authority or other key repository.

Session Key Decryption Service: allows DecryptNaBox clients to perform secure message session key decryption.

Management Service: Allows users to manage, configure, and view reports as well as review audit data captured by DecryptNaBox functions.

Approval Workflow Engine

The Approval Workflow Engine component of DecryptNaBox technology automates the decryption permissions process and the provisioning of access control. This eliminates the need to manually manage decryption permissions and configure access control to allow use of encryption keys.


The engine contains two portals

Management Portal: allows designated administrators to add or remove approval workflows, and assign administrators who can access the portal, manage trusted CAs for use by DataDecrypt Pro, and view reports.

Approval Portal: allows approvers to accept or reject decryption requests made by users. Additionally, it allows approvers to view the history of requests made in the past.

DataDecrypt Inline Components

Zeva’s long and deep understanding of data decryption needs in various markets, lead to the innovation of several inline components, able to integrate with multiple environments to automate and streamline compliances and regulatory requirements.

Book a Demo

Extensibility of DecryptNaBox

DataDecrypt is Zeva’s desktop software for decrypting files that have been encrypted with PKI credentials. Many organizations face challenges with managing their encrypted data when using strong asymmetric encryption.

Pair DataDecrypt with a backend key escrow to create an enterprise-level toolkit for managing, inspecting, recovering, and re-encrypted data across your enterprise. With features that search a filesystem for encrypted PSTs, various email format support and bulk decryption of files, Zeva’s DecryptNaBox software empowers your organization to use strong encryption without the fear of losing data.

This capability can be extended to existing clients, customized clients, plugins or stand-alone applications, and client applications that we write for you. Infinite use cases for extending DecryptNaBox’s decryption capabilities are at your fingertips.

Book a Demo

Zeva Partnerships

Zeva, Inc. has built strong relationships with other leading technology companies to push the limits of IT, together.

At Zeva, Inc., we believe that collaboration breeds innovation. No single entity can tackle all of the challenges we face alone. When industry experts come together to face those challenges, the resulting solutions are greater than the sum of their parts. To that end, we’ve formed long-term partnerships with the following technology leaders to help engineer the solutions of tomorrow.

Not sure what your needs are...
Let us help!

Our team of experts will schedule a call with you and your team, to help in assessing your needs and customize a solution tailored your encryption and identity challenges.

Request a Call

Zeva Customers

For the past 17 years, Zeva has been serving customers from the Federal, Commercial and Non-Profit markets around the globe. These are some of our many long-term partnerships and referenceable accounts that trust our solutions.

Free Products from Zeva

Discover all the clever ways Zeva Inc.’s free products can help you securely and efficiently automate mundane security tasks. Explore our catalog of free tools below to find a good fit for your organization. Then, contact us to request a free download of each solution you’d like.

SIDCleaner



SIDCleaner

Every object in Active Directory has a security identifier (SID). When an object is deleted, however, the SID remains. SIDCleaner removes that remaining SID.

GPOSync



GPOSync

This product syncs group policies, permissions, WMI filters, administrative templates, and organizational units from one environment to another.

AD Permissions



AD Permissions

AD Permissions exports and imports the access control lists of objects and the OU structure of AD.

Service Account Manager



Service Account Manager

Minimize the challenge of changing passwords for service accounts.