About UsProductsOur ClientsDownload Product InformationContact Proven Security Solutions

Case Studies
Features and Benefits

What Our Customers Are Saying About CipherShare

 "As an information security consulting company with a diverse and global client base, data integrity and confidentiality is our highest priority. Our business model historically has employed a 'virtual' environment; as such, CipherShare is the ideal collaboration tool to support our business practices."

Dave Beasant, Business Development Manager, 2Keys Corporation

CipherShare Features and Benefits PDF >>

Terms of Use
Proven Security Solutions makes information available on this web site subject to the following terms and conditions. By accessing this web site, you agree to these terms and conditions. Any rights not expressly granted herein are reserved. Proven Security Solutions and its partners and suppliers do not grant you any expressed or implied right under any patents, copyrights, trademarks or trade secrets.

Proven Security Solutions reserves the right to change these terms and conditions, the products and services referred to on this web site as well as any other material at any time, at its sole discretion and without notice. Further, you agree to be bound by any such changes when posted on this web site.

Proven Security Solutions reserves the right to seek all remedies available by law and equity, including the right to block access to this web site from your Internet address, if you violate any of these terms and conditions.

Copyright Statement

The information displayed on this web site is protected by copyright laws © 2006 Proven Security Solutions Limited. All rights reserved.

Except as otherwise indicated, you are authorized to view, print, copy and use documents from this web site subject to the following terms and conditions: documents may be used solely for informational, personal or non-commercial purposes; copies of documents or portions thereof must include all copyright and proprietary notices in the same form and manner as the original; documents may not be modified in any form, shape or manner; and, Proven Security Solutions reserves the right to revoke such authorization at any time, and any such use shall be discontinued immediately upon notice from Proven Security Solutions.

The right to view, print and copy documents does not include any rights to the layout, design and style of this web site. Such elements of this web site are protected by intellectual property laws, trade laws or other laws, and may not be imitated, copied or reproduced in whole or in part.

The right to use documents does not include the rights to distribute or to reproduce logos, graphics or images.

Warranties, Disclaimers and Limitations of Liability

All information on this web site is provided ‘as is’ without any kind of representation or warranty, either express or implied, including but not limited to, the implied representations, warranties or conditions of merchantability, fitness for particular use, security, accuracy or non-infringement. Proven Security Solutions disclaims any legal liability or responsibility for accuracy, completeness or usefulness of any information, product or service posted on this web site. Proven Security Solutions, its directors, officers, employees, associates, partners and suppliers do not assume any responsibility for: loss or damages resulting from information contained on this web site; errors or omissions in information, products and services referenced by or linked to this web site; or, any special, incidental, indirect or consequential damages of any kind, or any damages whatsoever, including without limitation, those resulting from reliance on materials presented, costs of replacement goods, loss of use, data or profits, delays or business interruptions, or any theory of liability, arising out of or in connection with the use or performance of information whether or not Proven Security Solutions has been advised of the possibility of such damages.

Forward-Looking Statements

This web site may include forward-looking statements with respect to business plans, activities, prospects, opportunities and events anticipated or being pursued by the Company and the Company’s future results. Although the Company believes the assumptions underlying such statements to be reasonable, any of the assumptions may prove to be inaccurate and, as a result, the forward-looking information may prove to be incorrect. The anticipated results or events upon which current expectations are based may differ materially from actual results or events. Therefore, undue reliance should not be placed on such forward-looking information. Further, the realization of the outcomes referred to in such statements involves a number of risks and uncertainties, including but not limited to: decisions, or the timing of decisions, made by third parties over which the Company has little or no control or influence; the level of interest of customers, employees, suppliers and investors in the Company and its markets, products and prospects and the potential loss of existing customers or suppliers; the availability of funding for customer purchases and financing for the Company; dependence on proprietary technology; changes in economic and market conditions, industry standards, and government laws and regulations; as well as other risk factors.


Unless otherwise noted, product names, designs, logos, titles, text and images herein are trademarks, service marks, trade names, copyrights or other property of Proven Security Solutions Limited or other third parties. You are not permitted to use any of these trademarks without the prior written consent of Proven Security Solutions Limited or such other third party.

Links to Third Party Web Sites

Proven Security Solutions’ web sites provide links to third party web sites which are not under the control of Proven Security Solutions. Proven Security Solutions makes no representations or warranty, either express or implied, about any third party web site. When accessing a third party web site, you are doing so at your own risk. Proven Security Solutions is not responsible for the reliability of any data, opinions, advice, statements, products and/or services made and/or offered on third party web sites. Provision of the links does not imply that Proven Security Solutions endorses, recommends, or accepts any responsibility for the content of such sites.

A Proven Security Solutions web site may mention third party products or services. Proven Security Solutions makes no recommendations or endorsements about third party products or services. References to third party products or services are provided by Proven Security Solutions ‘as is’ without any kind of representation or warranty, either express or implied.

Links to Proven Security Solutions Web Sites by Third Party Web Sites

Proven Security Solutions permits anyone to provide links to its web sites, subject to the following terms and conditions.

Web sites linking to Proven Security Solutions’ web sites: May link to, but not replicate, content contained in Proven Security Solutions’ web sites; Shall not create a border environment or browser around content contained in Proven Security Solutions’ web sites; Shall not present misleading or false information about Proven Security Solutions’ products or services; Shall not misrepresent Proven Security Solutions’ relationship with the linking web site; Shall not imply that Proven Security Solutions endorses or sponsors the linking web site or information, products and services contained in the linking web site; Shall not use Proven Security Solutions’ logos, trademarks or other copyrighted material without prior written permission from Proven Security Solutions; Shall not contain content that could be construed as obscene, libelous, defamatory, pornographic, or inappropriate for all ages; Shall not contain any information, products and services that would violate any laws; and, Shall agree that the link may be removed at any time upon Proven Security Solutions’ request pursuant to Proven Security Solutions’ reserved right to rescind its consent to permit the link. Compliance with Law, Governing Law and Jurisdiction

Export Law Assurances

You may not use or otherwise export or reexport the Software except as authorized by Canadian law and the laws of the jurisdiction in which the Software was obtained.

Privacy | Legal


  • End-to-end Encryption
  • Object Level Access Permission
  • Challenge/Response Authentication
  • Digital Signatures
  • No 'Super User'
  • Split Key Recovery
  • Key Signing and Verification
  Document/File Management
  • Auto-Versioning and Audit
  • Check-in/Check-out
  • Auto-Notification
  • Full Content Search
  • Roaming Secure Workspace
  • Integrated Secure Messaging
  • Integrated Secure Chat
  • Auto-Notification
  • Full Content Search
  • Streaming Encryption
  • Delta Versioning
  • Data Compression