top of page
Products background

Our Products

Bringing you the best of Data Security

TrustSafe UK logo

Domino Applications

Domino Admin Tools logo

Domino Admin Tools

Domino Admin Tools helps IT teams manage HCL/IBM Domino (Notes) accounts in bulk, reducing manual effort. For example, it can automatically review login history every day to spot inactive accounts, then notify admins for archiving or removal. Likewise, creating a new employee account (with mailbox and webmail replica) can be done in one automated step rather than many manual clicks. By centralizing account, mailbox and group management, this tool slashes routine workload and improves security (fewer forgotten or dormant accounts). In practice, a large bank or insurance firm using Domino could use it to onboard dozens of new users each week and clean out inactive directories on schedule. In short, it streamlines Domino administration so IT can focus on strategy instead of repetitive chores.

​

Industries:​

  • Insurance - large workforces with strict compliance for account management

  • Financial Services (Banking , Fintech) - high data/security needs for email systems

  • Healthcare - managing personnel changes and PHI-mailboxes securely

  • Government/Education - public sector organizations running Domino -based systems

Domino Migrator

Domino Migrator is designed for organizations moving off Domino Notes onto modern platforms. Imagine a corporation retiring its legacy Notes apps and mail: this tool automatically converts Notes emails, calendars, and documents into common formats (EML for mail, HTML/PDF/Word/XML for documents). It even preserves document links, attachments and metadata, and can import the converted data into new systems like SharePoint or SQL databases. In effect, it handles all the hard data mapping – so an enterprise can smoothly migrate years of Notes data into, say, Microsoft 365 or a custom cloud app without losing structure. This greatly reduces risk and manual effort in a data migration project. Companies use it to ensure “High Data Completeness” in migrations, avoiding broken references or lost files.

​

Industries:​

  • Large Corporations - especially those modernizing IT stacks

  • Government - agencies updating legacy collaboration tools

  • Education - universities moving off old Notes systems

  • Financial Services - banking consolidating data platforms

TSECM logo

Email Compliance Manager

TrustSafe Email Compliance Manager (TSECM) is an advanced mail gateway that enforces outbound email policies to block leaks and attacks. It lets a company define rules based on email content (subject, attachment type, sender, etc.) and automatically blocks or redirect suspicious emails. For instance, if an employee tries to email a spreadsheet of customer data outside the company, the system can intercept it, redirect it to the relevant approver, or alert security. It also supports mail routing: secretly copying or rerouting emails to compliance officers for review without notifying the original sender. All actions are logged for audit (helping with GDPR, HIPAA, PCI-DSS compliance). In practice, a bank or hospital might use ECM to prevent phishing and ensure confidential information never leaves the organization unprotected.

​

Industries:​

  • Finance & Banking - strict email security and audit trails needed

  • Insurance - guarding customer PII in correspondence

  • Healthcare - protecting patient data under HIPAA

  • Legal - ensuring attorney-client emails are secure and retained

  • Corporate (any with strong data leakage concerns)

Enigmator logo

Enigmator

RIC logo

Remote Import Certificate

Remote Import Certificate (RIC) by Enigmator simplifies distributing new PKI certificates to remote users’ security tokens. For example, when a remote employee’s access certificate is expiring, IT can upload the new certificate and PIN into RIC, which then sends an encrypted email to the user. The user clicks a button to import it into their smartcard or token. This means no more shipping USB tokens or special courier visits – admins can remotely push new certificates and passcodes to any workstation. The system enforces separation of duties (only certain admins manage the private key PINs) and logs every step for security audits. Large enterprises use RIC to maintain PKI-based logins or VPN access for roaming staff, saving time and preventing certificate-related downtime.

​

Industries:​

  • Government & Defense - distributing secure credentials across agencies

  • Banking & Finance - issuing smartcard certificates for online banking staff

  • Telecom - managing SIM/key certificates for field engineers

  • Large Enterprises - supporting remote workforce with PKI tokens

ETM logo

Enigmator Token Management

Enigmator Token Management (ETM) is a secure admin portal for handling locked or new PKI tokens and smart cards. When a user forgets a token password or a token becomes locked, ETM lets the administrator issue a challenge code and have the user enter a response code to remotely unblock the token. This eliminates trips to IT: employees can restore access themselves with a few clicks. Every action (initialization, unlocks, password changes) is recorded in a detailed log for audit. ETM also integrates with the certificate store (CSKeyFile) and RIC so that new or replaced tokens can be provisioned in one workflow. Industries that rely on hardware tokens – like banking or government – use ETM to minimize user downtime and keep PKI credentials flowing smoothly.

​

Industries:​

  • Banking/Financial - managing customer/employee authentication tokens

  • Government - secure identification (e.g. citizen ID smart cards)

  • Healthcare - clinicians accessing patient systems via PKI tokens

  • Enterprise IT - any company using two-factors hardware tokens or digital IDs

CSKeyFile logo

Central Secure Key File Store

CSKeyFile (Central Secure Key File Store) is a high-security repository for company-wide PKI certificates. Administrators can import and store large batches of P12 certificate files and their PINs in a separate encrypted database. The imported certificate files and PINs are encrypted with a separate master key, so even admins can’t see the actual passcodes. The system logs every access and retrieval, allowing auditors to track who exports which certificates. A key benefit: if an employee’s token is lost, IT can simply retrieve the latest certificate from CSKeyFile to initialize a new token, instead of reissuing it from scratch. CSKeyFile ties into the Enigmator suite (with ETM and RIC) to automate distribution. This is invaluable in industries that deploy thousands of digital certificates – it keeps everything secure and organized.

​

Industries:​

  • Telecom - managing mass-issued SIM or device certificates

  • Finance - storing employee/customer authentication keys

  • Government - handling citizen/public service ID certificates

  • Large Enterprises - any organization with extensive PKI deployments

Enterprise Secure Key Manager (ESKM)

Provides a single, unified solution for managing the full lifecycle of encryption keys. It helps businesses secure their most sensitive data, including customer information, intellectual property, and financial records. ESKM centralizes the creation, storage, and management of cryptographic keys, whether they are used on-premises or in multi-cloud environments.

​

By separating the encryption keys from the data itself, ESKM reduces the risk of data breaches and simplifies compliance with regulations like GDPR and HIPAA. The "single pane of glass" management interface simplifies administration, improves visibility, and streamlines audit processes. This ensures data remains secure and accessible while lowering operational complexity and costs.​

KeyBRIDGE

A centralized key management platform that simplifies and secures the entire lifecycle of cryptographic keys. It provides a single, unified solution for managing encryption keys across diverse environments, from on-premise hardware to multi-cloud setups.

This centralized control and “single pane of glass” view allow businesses to protect sensitive data while dramatically reducing the operational complexity and cost of managing keys from multiple vendors.

​

By automating key management and enforcing strict security policies, KeyBridge helps businesses meet tough compliance standards like PCI DSS and GDPR. It lowers the risk of data breaches by ensuring keys are always secure and properly managed. KeyBRIDGE frees up your team to focus on core business objectives, providing a critical layer of data security with a simplified, scalable, and highly efficient approach.

SecurityServer

A general-purpose Hardware Security Module (HSM) that serves as the "root of trust" for an organization's most valuable digital assets. It provides a highly secure, tamper-protected environment for all cryptographic operations, including the generation, storage, and use of encryption keys. This is critical for protecting sensitive data, ensuring digital identities, and securing online transactions.

​

For business executives, SecurityServer is a fundamental layer of defense. It simplifies security by centralizing key management and cryptographic tasks, reducing the risk of data breaches and human error. It also helps companies achieve and maintain compliance with strict regulations like GDPR, FIPS, and PCI DSS. By offloading complex and processor-intensive cryptographic operations to the HSM, the solution enhances the performance of critical business applications without compromising on security.

u.trust

The product line from Utimaco is a portfolio of solutions designed to build trust in the digital ecosystem. Rather than a single product, it encompasses a range of offerings, including Hardware Security Modules (HSMs), key management, and data encryption software. The core purpose of the u.trust line is to secure sensitive data and digital assets for businesses, regardless of where that data resides.

​

The key business benefits of the u.trust family include simplified data protection, enhanced compliance, and operational efficiency. Solutions like u.trust LAN Crypt provide transparent, role-based encryption for files and folders, while products such as the u.trust General Purpose HSM serve as the "root of trust" for all cryptographic operations. This approach helps businesses protect against ransomware and data breaches, meet stringent regulations like GDPR and PCI DSS, and reduce the complexity of their cybersecurity infrastructure.

WinMagic logo
SecureDoc by WinMagic logo

SecureDoc Endpoint Encryption

For executives concerned with data protection and compliance, SecureDoc Endpoint Encryption is an all-in-one solution that provides robust, full-disk encryption for every device. This product is engineered to ensure data is encrypted at all times, whether it's on an endpoint, server, or file. What sets it apart is its comprehensive, multi-platform support and centralized management capabilities, which allow for a single-console view and control over your entire fleet of devices. This streamlines management and ensures policy consistency across the organization, significantly reducing administrative overhead. The solution also integrates seamlessly with modern authentication methods, including passwordless pre-boot and Windows logins, offering both top-tier security and a user-friendly experience.

MagicEndpoint logo

MagicEndpoint Passwordless Authentication

In an era where password fatigue and credential theft are major security risks, MagicEndpoint Passwordless Authentication offers a modern, phishing-resistant solution. It is designed to completely eliminate the traditional user-password dynamic, replacing it with a continuous, "no-user-action" verification process. This not only enhances security by removing the most common attack vector but also dramatically improves the user experience. For a zero-trust architecture, MagicEndpoint provides continuous verification of both the user and the device. This approach moves beyond traditional multi-factor authentication (MFA) to create a more effortless yet highly secure authentication framework that is resilient against sophisticated attacks and supports federated identity.

MagicEndpoint FIDO Eazy logo

FIDO Easy

As a core component of the MagicEndpoint suite, FIDO Eazy is a specialized, phishing-resistant MFA solution built on the industry-standard FIDO2 protocols. For a business executive, FIDO Eazy represents a reliable and future-proof way to secure online accounts and services. Its strength lies in its ability to securely verify not just the user, but also the device they are using, providing a strong second layer of defense. By leveraging FIDO2, it ensures a cryptographic link between the user and their hardware, making it exceptionally difficult for attackers to intercept or steal credentials. This solution is a crucial element in building a layered security posture and is central to WinMagic's innovation in creating continuous, verifiable authentication processes.

Fornetix logo

VaultCore: Cryptographic Operations Platform

VaultCore is Fornetix’s flagship platform designed to streamline and automate encryption key management across an organization. It offers centralized policy control to encrypt data at rest, in motion, or during use—covering cloud environments, datacenters, DevOps pipelines, IoT devices, and virtualized systems. The platform integrates with hardware security modules (HSMs) and works with existing infrastructure—minimizing downtime or lost keys. Ideal for businesses aiming for scale, VaultCore supports over 100 million encryption keys and enables compliance with regulations like GDPR and CCPA. It delivers cost savings by reducing manual errors, breach risk, and operational complexity. At its core, VaultCore enables “zero trust” encryption automation that business leaders can rely on for broad organizational protection.s.

Orchestration Gateway: Non-KMIP Integration Agent

The Orchestration Gateway acts as a bridge for systems that don’t support the standard KMIP (Key Management Interoperability Protocol). It enables secure connection and control over encryption operations even when existing tools or vendors lack native support. For business use, this means organizations can plug in newer or legacy systems without ripping and replacing. The Gateway offers flexibility and cost-efficiency—helping integrate heterogeneous environments while maintaining a consistent policy, control, and audit framework. It’s especially valuable for companies with diverse tech stacks or acquiring new systems after mergers, giving them centralized governance over encryption across all tools.

ABAC Trust Controller & Verification Point (Policy Decision & Enforcement)

These two components work together to enforce attribute-based access control (ABAC): the Trust Controller makes the decisions — evaluating who should have access, under what conditions — and the Verification Point enforces them. Think of them as the brains and the guard: Controller decides; Verification Point implements. For executives, this means more precise control over who or what (people, devices, applications) can access encrypted data. Rather than blanket permissions, ABAC lets you define dynamic policies (time, location, role, device status) for access. This improves security posture while allowing agility. It supports zero-trust strategies by enabling least-privilege access and real-time decisions, which are increasingly critical for compliance, insider threat prevention, and regulatory auditability.

©2025 by InTegrity Services Ltd.  All right reserved.

bottom of page