About UsProductsOur ClientsDownload Product InformationContact Proven Security Solutions

Case Studies
Features and Benefits

What Our Customers Are Saying About CipherShare

 "As an information security consulting company with a diverse and global client base, data integrity and confidentiality is our highest priority. Our business model historically has employed a 'virtual' environment; as such, CipherShare is the ideal collaboration tool to support our business practices."

Dave Beasant, Business Development Manager, 2Keys Corporation

CipherShare Features and Benefits PDF >>

Proven Security Solutions respects your privacy and is committed to protecting the privacy interests of its customers, end users, distributors and suppliers. This privacy policy is intended to provide you with general information on how your personal information may be used.

Proven Security Solutions and Your Privacy

Proven Security Solutions may ask you to register and provide information that personally identifies you when you:

* register as a customer / end user;
* register a product purchase from Proven Security Solutions;
* request product upgrades or technical papers;
* request technical support;
* respond to marketing campaigns; or,
* request information.

The information gathered may be used to enhance the user experience on our web sites and to identify frequent visitors. Any personally identifiable information will not be sold to, disclosed to or shared with commercial third parties without the express prior consent of the information provider. This information may, however, be shared with suppliers or vendors for the purposes of improving our web-sites and general business processes.

Proven Security Solutions and Use of your Personal Information

Proven Security Solutions may use your personal information for the following purposes:

* to improve the content of our web sites, products and services;
* to alert you to product upgrades, updates and renewal information regarding your product and service;
* to share special offers, product announcements and updated information from Proven Security Solutions; and,
* to announce new services from Proven Security Solutions.

Proven Security Solutions and Cookies

Proven Security Solutions may from time to time use software tags called “cookies” to identify customers when they visit our web sites. Cookies are small packets of information that are stored by your browser on your computer’s hard drive. Proven Security Solutions cookies allow us to recognize each returning customer and their relevant information so that you do not need input the same information more than once. They help us understand your preferences and customize our products and services to your needs. We do not place any personal identity information in your cookies. In addition, cookies are not used to access information stored on secure sites.

If you do not want Proven Security Solutions to deploy cookies in your browser, you can set your browser to reject cookies or notify you when a web site tries to put a cookie in your browser software. It should be noted that enabling the cookie rejection functions of your browser software may affect your ability in using some of the information on our web sites.

Proven Security Solutions and Disclosure to Outside Parties

Proven Security Solutions may disclose information as allowed or required by applicable law, including making disclosures that are necessary or advisable to protect the rights, safety or property of users, the public, Proven Security Solutions or our suppliers or to conform to legal and regulatory requirements.

Proven Security Solutions and Links to Outside Parties

Proven Security Solutions may provide links to other organizations with which we have a relationship. Proven Security Solutions is not responsible for the privacy policies of these organizations. We encourage you to review their respective privacy statements as they may be different from ours.

Proven Security Solutions and Security and Protection of Your Information

Proven Security Solutions ensures that all online communication with our customers meets our high standards of privacy and security. We take strong measures to protect all customer data from unauthorized access or disclosure, misuse, loss, alteration or destruction.

Proven Security Solutions and Your Consent

By using our web sites, you allow the collection and use of your information by Proven Security Solutions.

Proven Security Solutions Privacy Policy Updates

Proven Security Solutions will review these privacy policies from time to time. If there are any changes to our privacy policies, we will post those changes on this page so that you are kept informed of our latest privacy policies.

Privacy | Legal


  • End-to-end Encryption
  • Object Level Access Permission
  • Challenge/Response Authentication
  • Digital Signatures
  • No 'Super User'
  • Split Key Recovery
  • Key Signing and Verification
  Document/File Management
  • Auto-Versioning and Audit
  • Check-in/Check-out
  • Auto-Notification
  • Full Content Search
  • Roaming Secure Workspace
  • Integrated Secure Messaging
  • Integrated Secure Chat
  • Auto-Notification
  • Full Content Search
  Bandwidth Optimization
  • Streaming Encryption
  • Delta Versioning
  • Data Compression