Our Products
Security

Protect your sensitive data, securely email your colleagues and clients, transfer files of any size or work collaboratively in a completely secure environment either in-house or in the cloud – Galaxkey does it all with no fuss or interference to your daily business routine.
Galaxkey is Certified Product Assurance (CPA) approved so you know you are in safe hands whether you are a personal user or a multi-national enterprise.
Easy to deploy and use. Secure government level end-to-end encryption with no backdoors.
Get the best, get Galaxkey !
Key Features

Secure Email
Send and receive encrypted email simply and easily via Galaxkey add-ins for your favourite products or via the web-based interface.

Collaborative Workspaces
Setup Galaxkey Workspaces for your internal teams, third parties and customers. Collaborate on documents or simply use Workspace to remove emailing of files completely. Galaxkey Workspaces will change the way you do business.

Document Classification
Classify your emails and documents. Use standard levels of classification or create your own up to meet your business needs. Galaxkey classification is compatible with Borland-James and Titus.

GDPR Breach Protection
Galaxkey contains a number of features to prevent accidental breaches of GDPR including full expansion of email addresses, carbon copy (CC) line checking and the ability to revoke (disable access to) an email that has been sent out in error.

Full End to End Encryption
Galaxkey always encrypts emails or files before they are transmitted. This ensures data is protected before it leaves your network, crucial to prevent hackers who may be intercepting transmissions from viewing your data.

Cloud or In-house Deployments
Galaxkey can be installed either in the cloud or as a full in-house installation. Installation in either environment is quick and seamless for your business-.

Secure Documents
Protect your documents with a click of the mouse. Send files securely to anyone. Protect your files on Drop Box, OneDrive etc.

Digital Document Signing
Get legal documents signed quickly and easily using Galaxkey Digital Document Signing. Support for multiple signatories, round-robin or 'all sign at once' signing processes.

CPA Approved Security
Galaxkey has achieved Certified Product Assurance (CPA). Galaxkey security functions meet National Cyber Security Centre (NCSC) standards - which test a products' suitability for use within the UK public sector.

No Backdoors Guaranteed
Galaxkey guarantees there are no backdoors within its products meaning you have the assurance that no-one can get access to your data unless you have authorised it. This includes all Galaxkey employees as well.

Technical Adaptability
Galaxkey recognise that not all businesses are the same. Galaxkey Technical experts will work with your to find the optimum setup for your business and can do technical development to meet your security needs.
GDPR Compliance
IcaaS
The General Data Protection Regulation (GDPR) is here and it’s here to stay!
Yet a huge number of companies have not yet taken any action to ensure they conform to the regulation, many don’t even know what the regulation requires, let alone that breaching the regulation can result in massive fines!
Take the stress out of ensuring your business is GDPR compliant by using iCaaS.
KEY FEATURES

GDPR Compliance Document Generator
Create bespoke GDPR compliant policies and documents quickly and easily.

Breach Management
Determine which breaches need to be reported via to the ICO. If the worst happens it is crucial to act fast and appropriately and understanding which breaches need to be reported is key.

Evidence of GDPR Compliance
iCaaS will create a "Body of Evidence" as prescribed by the regulation as proof of your GDPR compliance.

Subject Access Request Management
Manage all Subject Access Requests (SAR) using the Rights and Requests Module. Alerts and notifications ensure you stay on top of all requests and respond in the appropriate timescales.

GDPR Compliance Score
Ensure your business remains up to date with its GDPR compliance using monthly activity-based questions.

Full GDPR Support
When you use iCaaS you're not on your own. Certified data protection specialists are always on hand to provide consultancy and support. You can even outsource your Data Protection Officer (DPO) responsibilities using the Virtual DPO service.
Secure File Transmission
Managed File Transfer Systems
Managed File Transfer (MFT) allows businesses to consolidate their data flow into an automated system.
By using a MFT system businesses can ensure that they are able to track the flow of data in and out of the company, critical for ensuring and maintaining GDPR compliance. An MFT will provide a huge range of benefits including reduced costs, better security, improved operational performance through data transfer automation etc.
Key Features

Internal Integration
It is not always possible to remove legacy applications so it is necessary to integrate them. MFT can transfer the data to where it needs to be and provide a certain level of integration using plugins and connectors. MFT can, for example, integrate with email, CRM systems, finance systems, HR systems, ERP and Active Directory.

Removal of Manual Processes
MFT will replace numerous transfer scripts and the reliance on keeping those scripts updated when things change within the business. Automation reduces the chances of human error and the dependency on certain staff to 'keep the data flowing'.

GDPR Compliance
MFT dashboards provide visibility of all data transfers. This allows organisations to achieve the detailed auditing and reporting required for compliance. Automated secure data wiping and consent capture supports compliance with the GDPR and other regulations.

Better Transfer of Large Files (Big Data)
Traditional file-sharing tools such as FTP and HTTP were never designed for this kind of task, but MFT solutions specifically designed for this use a combination of both UDP and TCP transfer protocols. UDP is used to transfer the data, whilst TCP is used to ensure that any packets lost are resent. An agent at the receiving station is used to reconstruct the data after the transfer.

Cloud Based Integration
Fully hosted MFT in the cloud is become more and more popular, providingthe automation, security and reporting of traditional MFT, but with all the benefits of the cloud. But whether on-premise or cloud hosted, good MFT systems have out-of-the box cloud connectors. These allow businesses to take advantage of cloud storage securely.

Improved Security
MFT consolidation of file transfers ensures all data is properly protected and tracked both inside and outside your business. By using state of the art encryption of data and restricting permissions to file folders business information will be kept safe from prying eyes.

Greater Visability of Data Flows
MFT consolidates all your transfers providing much better management of data flow. Dashboards provide a clear view of the status of transfers and SLA alerts can be set up to provide pro-active management of potential transfer problems before they become business issues.

Stronger Operational Resilience
MFT provides out-of-the-box High Availability (HA) and Disaster Recovery (DR). HA load balancing allows files to be transferred across more than one server, eliminating down-time and making sure processes run quickly and efficiently.