Our Products

Security

Protect your sensitive data, securely email your colleagues and clients, transfer files of any size or work collaboratively in a completely secure environment either in-house or in the cloud – Galaxkey does it all with no fuss or interference to your daily business routine. 

Galaxkey is Certified Product Assurance (CPA) approved so you know you are in safe hands whether you are a personal user or a multi-national enterprise.

Easy to deploy and use. Secure government level end-to-end encryption with no backdoors. 

Get the best, get Galaxkey !

Key Features

check-153363_640160

Secure Email

Send and receive encrypted email simply and easily via Galaxkey add-ins for your favourite products or via the web-based interface.

check-153363_640160

Collaborative Workspaces

Setup Galaxkey Workspaces for your internal teams, third parties and customers. Collaborate on documents or simply use Workspace to remove emailing of files completely. Galaxkey Workspaces will change the way you do business.

check-153363_640160

Document Classification

Classify your emails and documents. Use standard levels of classification or create your own up to meet your business needs. Galaxkey classification is compatible with Borland-James and Titus.

check-153363_640160

GDPR Breach Protection

Galaxkey contains a number of features to prevent accidental breaches of GDPR including full expansion of email addresses, carbon copy (CC) line checking and the ability to revoke (disable access to) an email that has been sent out in error.

check-153363_640160

Full End to End Encryption

Galaxkey always encrypts emails or files before they are transmitted. This ensures data is protected before it leaves your network, crucial to prevent hackers who may be intercepting transmissions from viewing your data.

check-153363_640160

Cloud or In-house Deployments

Galaxkey can be installed either in the cloud or as a full in-house installation. Installation in either environment is quick and seamless for your business-.

check-153363_640160

Secure Documents

Protect your documents with a click of the mouse. Send files securely to anyone. Protect your files on Drop Box, OneDrive etc.

check-153363_640160

Digital Document Signing

Get legal documents signed quickly and easily using Galaxkey Digital Document Signing. Support for multiple signatories, round-robin or 'all sign at once' signing processes.

check-153363_640160

CPA Approved Security

Galaxkey has achieved Certified Product Assurance (CPA). Galaxkey security functions meet National Cyber Security Centre (NCSC) standards - which test a products' suitability for use within the UK public sector.

check-153363_640160

No Backdoors Guaranteed

Galaxkey guarantees there are no backdoors within its products meaning you have the assurance that no-one can get access to your data unless you have authorised it. This includes all Galaxkey employees as well.

check-153363_640160

Technical Adaptability

Galaxkey recognise that not all businesses are the same. Galaxkey Technical experts will work with your to find the optimum setup for your business and can do technical development to meet your security needs.

GDPR Compliance

IcaaS

The General Data Protection Regulation (GDPR) is here and it’s here to stay! 

Yet a huge number of companies have not yet taken any action to ensure they conform to the regulation, many don’t even know what the regulation requires, let alone that breaching the regulation can result in massive fines! 

Take the stress out of ensuring your business is GDPR compliant by using iCaaS.

KEY FEATURES

gdpr-3639730_640

GDPR Compliance Document Generator

Create bespoke GDPR compliant policies and documents quickly and easily.

gdpr-3639730_640

Breach Management

Determine which breaches need to be reported via to the ICO. If the worst happens it is crucial to act fast and appropriately and understanding which breaches need to be reported is key.

gdpr-3639730_640

Evidence of GDPR Compliance

iCaaS will create a "Body of Evidence" as prescribed by the regulation as proof of your GDPR compliance.

gdpr-3639730_640

Subject Access Request Management

Manage all Subject Access Requests (SAR) using the Rights and Requests Module. Alerts and notifications ensure you stay on top of all requests and respond in the appropriate timescales.

gdpr-3639730_640

GDPR Compliance Score

Ensure your business remains up to date with its GDPR compliance using monthly activity-based questions.

gdpr-3639730_640

Full GDPR Support

When you use iCaaS you're not on your own. Certified data protection specialists are always on hand to provide consultancy and support. You can even outsource your Data Protection Officer (DPO) responsibilities using the Virtual DPO service.

Secure File Transmission

Managed File Transfer Systems

Managed File Transfer (MFT) allows businesses to consolidate their data flow into an automated system.

By using a MFT system businesses can ensure that they are able to track the flow of data in and out of the company, critical for ensuring and maintaining GDPR compliance. An MFT will provide a huge range of benefits including reduced costs, better security, improved operational performance through data transfer automation etc. 

Key Features

check-153363_640160

Internal Integration

It is not always possible to remove legacy applications so it is necessary to integrate them. MFT can transfer the data to where it needs to be and provide a certain level of integration using plugins and connectors. MFT can, for example, integrate with email, CRM systems, finance systems, HR systems, ERP and Active Directory.

check-153363_640160

Removal of Manual Processes

MFT will replace numerous transfer scripts and the reliance on keeping those scripts updated when things change within the business. Automation reduces the chances of human error and the dependency on certain staff to 'keep the data flowing'.

check-153363_640160

GDPR Compliance

MFT dashboards provide visibility of all data transfers. This allows organisations to achieve the detailed auditing and reporting required for compliance. Automated secure data wiping and consent capture supports compliance with the GDPR and other regulations.

check-153363_640160

Better Transfer of Large Files (Big Data)

Traditional file-sharing tools such as FTP and HTTP were never designed for this kind of task, but MFT solutions specifically designed for this use a combination of both UDP and TCP transfer protocols. UDP is used to transfer the data, whilst TCP is used to ensure that any packets lost are resent. An agent at the receiving station is used to reconstruct the data after the transfer.

check-153363_640160

Cloud Based Integration

Fully hosted MFT in the cloud is become more and more popular, providingthe automation, security and reporting of traditional MFT, but with all the benefits of the cloud. But whether on-premise or cloud hosted, good MFT systems have out-of-the box cloud connectors. These allow businesses to take advantage of cloud storage securely.

check-153363_640160

Improved Security

MFT consolidation of file transfers ensures all data is properly protected and tracked both inside and outside your business. By using state of the art encryption of data and restricting permissions to file folders business information will be kept safe from prying eyes.

check-153363_640160

Greater Visability of Data Flows

MFT consolidates all your transfers providing much better management of data flow. Dashboards provide a clear view of the status of transfers and SLA alerts can be set up to provide pro-active management of potential transfer problems before they become business issues.

check-153363_640160

Stronger Operational Resilience

MFT provides out-of-the-box High Availability (HA) and Disaster Recovery (DR). HA load balancing allows files to be transferred across more than one server, eliminating down-time and making sure processes run quickly and efficiently.