Data protection through a single pane of glass.

Control Data Access Everywhere


Implementing a “protect everything” approach to data security has never been easier. With SPxSHARC ll’s easy to use virtual management console, agents are easily deployed and managed locally, remotely or in the cloud providing a holistic view of your data protection and complete control of data access.

An intuitive and comprehensive interface to control and manage data protection.

Advanced Encryption

Combining AES-256 encryption and our patented FIPS 140-2 certified cryptographic splitting technology, SPxSHARC ll delivers advanced, provably secure data protection no matter where data resides (local, remote, hybrid or cloud). With performance that can be as fast as clear text, you are able to encrypt your data with negligible operational impact.

Cloud Privacy with Privileged Access Management

With SPxSHARC ll’s privileged access management feature, you can rest assured your data is completely private in any cloud environment. Implementing restrictions on cloud vendor admins and root users means they never have access to your data and you are in complete control of your cloud security and privacy.

Role-Based Data Access Controls

Role-based, least privileged access and privileged user (root/admin) controls, coupled with fine-grained policy options, puts you in charge of who can access your data. With robust and flexible access control settings, policies can be defined at the file or volume level. Cryptographic separation at the file level provides an extra layer of protection and supports secure multi-tenant storage environments.

Integrated and Transparent Key Management

Integrated, transparent key management provides simplified but robust features for your keys including key rotation that conforms to industry compliance requirements and key revocation for data destruction. Additionally, software-defined keys embedded within the data itself eliminates the need for costly external hardware bulk key stores, and makes managing your keys far less cumbersome.

Compliance and Audit Readiness

Be compliance and audit ready with SPxSHARC ll. Real time logging ensures all notices are properly logged and forwarded. Based on policy definitions, the reliable eventing feature captures, flags, and forwards specified or all data accessed – seamlessly integrating with existing SIEMs. 

End-to-End Integration Management

A centralized management console provides a single vantage point to deploy, monitor and update all instances of SPxSHARC ll across your enterprise. Easily define and manage policies, initialize and update provisioning of agents, data and system life cycle management, policy log aggregation and key management— all in one place. Solutions are easily deployable via an OVA, other virtual environments, or bare metal servers.

SPxSHARC ll features and functions enabling business benefits.

Policy resized

Fine-grained Policy Definition

Fine-grained with cryptographic separation.

Policies can be defined down to the individual file level if you choose, a feature that gives you robust options for your data access strategy.

priv access copy resized

Privileged Access Management

Eliminate admins from seeing clear text.

Restrictions can be placed on privileged users, system admins and root users, via policy to eliminate their ability to see clear text data. This feature provides complete privacy in the cloud as the service provider cannot view the data you entrust them with.

role based resized

Role-based Permissions

Who, what, when, where and how.

Customer-defined roles (user, group, process) gives permissions to only those needing data access as defined by an organizations' policy.

separation revised

Separation of Duties

Distinct administrator roles.

Two distinct administrator roles, a System Administrator and a Security Administrator) gives an extra layer of protection since an additional and separate approval is required before agents and policies can be approved and deployed.

least priv revised

Least Privileged Access

Access to only what is needed.

Least privileged access controls allow you to give access to the data only necessary for the job and not a bit more, ultimately mitigating insider threat risks.

Centralized resized 2

Centralized Management

Single pane of glass virtual console.

A centralized virtual management console gives you a single vantage point to deploy, monitor and update all instances of SPxSHARC ll across your enterprise.

priv access resized


Protection for volume, file, or hybrid.

With versatility of volume, file or hybrid agent functionality, data is protected from the point of creation to the storage environment.

Privileged resized


Maintain direct control of data and data access.

Inherent features lets you rest assured that data is completely confidential in any environment. Restrictions can be placed on privileged users via policy to eliminate their ability to see clear text data, ensuring complete confidentiality when entrusting your data to a cloud service provider.

Scalable resized 2


Scalable to your environment.

No matter industry or business size, SPxSHARC II can be tailored to specific requirements, with scalability features independent of data storage environment.

Performant resized

Highly Performant

Encryption can be as fast as clear text.*

Using a combination of AES-256 certified encryption and cryptographic splitting, the product provides “provably secure” data protection with performance as fast as clear text.

We have the perfect fit for your data challenges.

No matter your industry or size, SPxSHARC ll can be tailored to your specific requirements, with scalability features independent of data storage environment.

Cloud Confidence Resized

Cloud Confidence

With SPxSHARC ll policy, cloud provider admins and root users can be restricted, giving you complete privacy in cloud and hybrid cloud environments.  With provable security for your data, cloud adoption has never been more in reach.

Multi-Vendor resized


Managing vendor access to data has never been easier with SPxSHARC ll. Robust policy management controls allow vendors to see only the data you want them to see and makes secure collaboration a reality.

SupplyChain resized

Supply Chain

SPxSHARC ll allows you to restrict suppliers to specific system functions and give access permissions to only specified data, providing visibility management, control and security in a multi-supplier access environment across your supply chain.

*Performance results are subject to configuration, processing power, type of data, etc. Please contact Security First Corp. for more information.

Disclaimer: Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Copyright © 2017 Security First Corp.     Terms of Use     Privacy Policy     Support Desk