+48 22 827 32 57


How to secure sensitive data?

Currently, in the times of theft, cyber-attacks and an enormous potential of IT technologies, allowing users to obtain secret knowledge, often developed by large teams over many years, the security of confidential data, i.e. manufacturing secrets (know-how), results of scientific research, strategic and technological plans of enterprises, legal documents, trade agreements and many people’s personal information are all at risk of various threats.

DSS CSS Ochrona danych
DSS CSS Ochrona danych

Data protection thanks to

DSS and CSS solutions have been created to protect electronic documents in order to tackle different abuses, hacking scandals (PRISM, TEMPORA), wide-spread industrial espionage, partners’ and co-workers’ disloyalty and dangers resulting from the possibility of obtaining someone’s secrets (private, economic, administrative and political) – allowing Companies for a real protection of their secrets. Thanks to DSS and CSS your data will be protected against interception by third parties (privately, at work, in administration and in the world of business and politics), and the results of your work and confidential information will be protected so that no unauthorised people will be able to use them.

Solutions for valuable data protection

21st century data protection

DSS Document Security System

Deep encryption and management

DSS DSS protects documents by first encrypting their contents using a military algorithm, and then allow the document owner manage them so that only authorised persons will be able to open the protected document. Even if an authorised person transferred your document to someone else, they will not to be able to open it, unless you allow them to. If you lose your data, for example through laptop theft, or send the wrong email attachment, no unauthorised people will be able to open the DSS-protected files.

Protection against screenshots

In car industry, for instance, it takes a few years to create a new car design which, while restrictively protected, can be then revealed through a screenshot. This problem affects many industries, including chemical industry (formulations), graphic design industry (cover designs), architects, legal firms, perfume industry, etc. In this situation, a far-reaching protection against screenshots becomes very important. DSS protects you from screenshots in many ways, and the level of protection is amongst the most advanced in the world.

Content protection

In DSS, a tri-tier protection against the copy and paste mechanism is integrated with the organisation’s safety policy. This simple mechanism is often responsible for many data leaks. DSS allows you not only to protect your sensitive documents against unauthorised copying of contents, but also to adjust the protection mechanism to the situation.

Print protection

The mechanism of print protection in DSS is very precise, allowing you to stop unauthorised users from printing the document. Printing can potentially lead to document leaks, and its intelligent protection constitutes one of the pillars of safety in each organisation.

Controlling documents sent outside the organisation

So far, files sent outside the organisation or transferred to an external partner where, at the moment of sending or transferring were out of your control–and in reality you had no impact on who would eventually see them. Thanks to DSS you can maintain control over your documents sent outside your organisation and decide who and when is allowed to access the documents you sent.

Cutting off access to secure documents

DSS enables cutting of the access of a specific person to all the secure documents they were given access to earlier. Thus when, for example, you terminate your cooperation or lose trust in a partner that you cooperated with for several years, sharing important and secret documents, and discover that they started cooperating with your competitors, you can cut this person off from all secure documents, no matter where this person is and no matter what computer or device they store the files on. You choose when to cut off or restore access to your documents.

Time-limited files

With DSS, you can also create time-limited files, for instance sending a document to a given person with a limitation that it can only be open e.g. by 4 p.m. on Friday. Next, using logs*, we can check who did what with the transferred document, and when, having access to the full history of actions on the protected files. Thus, if we send someone an offer, we will be able to know if and when exactly the recipient opened it.

Authorised location and computers

DSS Administrator can also define MAC addresses of computers that can be used to work on protected files. Thanks to the possibility to define IP addresses, DDS allows you to select a location where users can work on the protected files. Hence, we can limit the location to work on sensitive files exclusively to organisaton offices, or both the office and home. We can even select the countries where it is possible to work on the protected documents, e.g. in the company’s manufacturing plants. A DSS System Administrator can also define the MAC addresses of computers whose users can work on the protected files.

Easy and intuitive DSS management

DSS management is intuitive and very simple. It does not require specialist IT knowledge, and all you need to use it is log in. DSS does not require any special operations and it does not change your usual work habits. You can work on your DSS-protected documents both online and offline.

Protecting file formats

DSS protects the following file formats:

  • MS Word: doc, docx, rtf, txt, xml
  • MS Excel: xls, xlsx
  • MS Power Point: ppt, pptx
  • Adobe Acrobat: pdf
  • Graphic files: jpg, jpeg, gif, png

CSS Cryptographic Security System

How to secure information?

There is certain critical information in different applications (Word, Excel, AutoCAD, Photoshop, etc.) data bases (MS SQL, Oracle, PostgrSQL) or business solutions, such as ERP, CRM, BI and DMS, which–in order to secure your company’s competitive advantage–should be protected particularly carefully.

Insufficient protection of confidential information can result in it being leaked to competitors or other third parties.

The CSS Solution, including FPP, FSP and FCP, helps protect valuable information against unauthorised use by employees who are disloyal or intend to switch employers, or by any other people.

CSS DSS Ochrona danych

CSS Solutions

FPP (Flashgate Print Protection)

FPP allows you to block printing the contents of the documents (e.g. in Word, Excel, AutoCAD, etc) or data included in the system (ERP, CRM, BI, DMS).

Using an unprotected application, an employee can print data and document contents, but with FPP printing will be impossible and your files and data will be secure.

The company’s valuable data will be protected against unauthorised printing.

An FPP licence is assigned to a specific computer (work station). After installing it on a server, FPP can protect applications or systems in terminals.

FSP (Flashgate Screen Protection)

FSP enables blocking print screen with the PrtSc key or any other applications.

FSP also allows you to block “filming” the screen with any application or remote screen sharing with a person outside the company through e.g. Skype, Teamviewere or Webex.

It will be impossible to register document contents (e.g. Word, Excel), figure (e.g. AutoCAD) or data in business solutions (e.g. ERP, CRM or DMS) with a Print Screen, hence protecting the company’s valuable information.

FCP (Flashgate Clipboard Protection)

FCP enables you to block copying document contents (e.g. Word, AutoCAD) or data from business solutions (e.g. ERP, CRM, DMS) to other applications (e.g. Notepad, Excel, etc). As a result, it is impossible for an employee to use the Copy and Paste mechanism and thus obtain valuable information.

FCP enables using the Copy and Paste mechanism in order to add data from, for example, internet browser, or another application of a protected system (e.g. CRM) in a way which will allow the employees to add data to the protected system or business solution, but not to copy information from applications or business solutions protected by FCP. Consequently, the company’s valuable information will be protected.


Would you like to know more about protecting
your ideas and valuable data?

Polityka prywatności

Copyrights © Alna Business Solutions Sp. z o.o. All rights reserved   Desing by 101 So. z o.o., Kamila Błęcka