Protect yourself from inevitable security breaches. Credeon prevents unauthorized users and entities from accessing your files stored in the cloud.
With a drag-and-drop interface and mobile device access it is easy to protect your files in the cloud. Credeon works with all major cloud storage solutions.
Do you want to share your files protected by Credeon? Go Pro to enable Credeon's secure sharing features along with user control, audit logs and more.
Based on Japan’s #1 encryption software, HIBUN, used by over 6 million people worldwide, Credeon prevents unauthorized parties from accessing confidential data. With Credeon's solid security features, such as client-side encryption and remote encryption key management, users can encrypt and store data on their own terms and securely share protected data with authorized users.
Access the cloud-based dashboard for centralized user management, role-base access control, and security policy from any device, anytime and anywhere.
Works with all major public cloud storage services, including Box, Dropbox, Google Drive, and Microsoft OneDrive. You can also use multiple storage services at the same time.
By combining industry standard AES 256-bit encryption algorithms and FIPS 140-2 certified cryptography module, Credeon offers the toughest data protection in the cloud.
By sending an invitation to any colleague or client, you can grant immediate access to your encrypted files in the cloud. Secure collaboration doesn’t get any easier than that.
Provides seamless key management for multiple projects and all of your authorized users, so no one has to juggle keys or remember passwords to encrypt and decrypt your files.
Multi-factor authentication allows you complete control of data access and account lockouts. Off-line access with time-restriction security protects your data on any mobile device.
Credeon generates your personal encryption key through a secure authentication process. This way, no one has access to your data except you and those you authorize.
Credeon helps you review project member activities and group-user file activities. Easily monitor colleague data access during routine security log checks.