Skip to Main Content

SD-WAN Makes Getting Too Close to the Edge Dangerous.  Read More.

Contact Sales Login
Explore New Features
A Complete & Growing Menu of Cloud-Based Services
Privafy delivers — today’s most complete protection against cyber attacks. By integrating full-stack security functionality into a suite of cloud-native services, we’re able to safeguard your Data-in-Motion within all business environments — at a fraction of the cost of legacy solutions.

Advanced, Patented Technologies Included

Privafy protection also includes advanced, proprietary technologies that aren’t available anywhere else. For example, our Absolute Encryption™ schema defends against “man-in-the-middle” or unauthorized snooping attacks. Patented endpoint identity protection guards against endpoint cloning. And our new Impervious Firewall™ technology delivers dynamic perimeter security with fine-grain rules for inbound and outbound control, plus deep content inspection for data loss prevention and comprehensive malware screening.

Check Out Our Full Feature List!

The capabilities shown below are available now, or coming very soon. Check back regularly to see what new features we’ve added.

  • Non-degrading encryption at line rate
  • Privafy proprietary concurrent multi-key encryption
  • Zero-Touch Encryption Key Management
  • Key Management using hyperledger
  •  Intelligent profile assignment, validation and activation
  • Privafy standard website and destination across access control by
    • Web classification and reputation
    • IP reputation
    • Anti-phishing
  • Site and destination access control through DNS Filtering
  • Traffic flow monitoring and policy enforcement using intelligent DNS
  • Traffic filtering
    • Application*
    • Geography
    • File Type
    • URL
    • Destination IP address
    • Protocols
    • Ports
  • Malicious URL steering *
  • AI-based detection of anomalous outbound traffic patterns
  • Standard Privafy dictionaries
  • Customer supplied policies (add-on)
  • AI-based traffic flow anomaly detection
  • Visibility of Access to:
    • Public/Private Cloud
    • SaaS Applications
  • Control of Access to:
    • Public/Private cloud
    • SaaS Applications
  • FIPS 140-2/3 (add-on)
  • JITC (add-on)
  • Common Criteria (CC) (add-on)
  • Rapid implementation using zero touch provisioning
    • Auto discovery
    • Automated install from Privafy cloud
    • Intelligent high frequency encryption key rotation
  • Categorization of alerting and alarms by severity and actionable
  • User selected multi-level event logging
  • Audit trails for system and user activity
  • Multiple administrator profiles and permissions for policy controls*
  • Real-time visibility of the usage, performance and health
    • Visibility
    • Control
  • REST API’s
    • Reporting
    • Event logging
    • Alerting
  • Integration with user directories*
    • Microsoft active directory
    • Google Suite directory
  • Multi-Cloud container architecture
  • Public-Public Cloud Redundancy
  • Custom Private-Public Cloud Redundancy (add-on)
  • Geographical redundancy – Local, Regional, Global
  • Active-active per-customer container-based cluster (add-on)
  • Database redundancy
  • Customer Information Protection
  • Privafy Customer Information Protection Standards
  • Easy installation and auto-scaling
  • Redundancy support with clustering
  • Load balancing across clusters
  • Clone-proof
  • Resiliency
    • Active-active containers across cores
    • Active-active containers across zones
  • Secure Access to Private Cloud
  • Amazon Web Service (AWS)
  • Microsoft Azure
  • Google Cloud Platform (GCP)
  • Privafy Intrusion Detection System
    • Standard based on Privafy selected threat databases
    • Customer selected threat databases (add-on)
    • AI-driven augmentation of threat databases
  • Privafy Intrusion Prevention System
    • Standard Privafy policies and actions including block and notify
    • Custom provided policies and actions (add-on)
  • Denial of Service Prevention
    • Privafy proprietary site-based DoS & DDoS detection & mitigation
    • Pre-emptive network-wide DoS & DDoS prevention rules
  • Generic Inbound service management
  • Header Inspection
    • Standard dictionaries and self-identified site ratings
    • Customer supplied policies (add-on)
    • AI augmented dictionaries and ratings
  • Payload Inspection
    • Payload inspection using Private Intermediate Root Certificate
    • Standard Privafy dictionaries-based policies
    • Customer supplied policies (add-on)
    • AI augmented dictionaries and ratings
  • Sandbox & Quarantine of unknown and suspicious content
  • Intra-LAN traffic & broadcast detection*
  • Intra-LAN traffic& broadcast classification*
  • HIPAA
  • PCI
  • Customer Traffic Prioritization
    • By Application*
    • Destination and Geography*
    • Customer provided dictionaries for routing policies (add-on)
    • Policy-based bandwidth allocation
    • Customer supplied per user traffic steering policy (Source/Cloud)
  • Dashboards for traffic data visualization
  • Higher security, efficient routing and packet processing using IPv6
  • IPv4 & IPv6 interworking
  • Tamper-resistant hardware design
  • Clone-proof
  • Chip-embedded device keys — Plug & Trust
  • Redundant 1G LAN & WAN Connectivity
  • Stackable NetEdge 1G devices (10 x 1G per location) (add-on)
  • Available in 1U rackmount-compatible
  • Ultra-low power consumption
  • Self-managed software
  • Resiliency
    • Active-active Redundant ISP WAN link steering
    • Active-active Dynamic Application-aware path redundancy and selection
    • Active-active redundancy across stacked 1G devices
  • Clone-proof
  • Multiple platform and operating system support
    • Apple iOS v13 (Minimum)
    • Android v8.0 Oreo (Minimum)
    • macOS v10.12 (Minimum)
    • Windows 10 (Minimum)
    • Linux OS (Ubuntu 19.04)
  • Multi-factor authentication
  • Dynamic NetEdge/CloudEdge connectivity
* Feature is coming soon and is not included in current website pricing.
Please contact Sales or your channel partner for pricing for add-on features. All Privafy services are governed by the Privafy Terms of Service and Privacy Policy. Privafy may at any time update the services or discontinue any feature or functionality

The way your data travels is changing, why hasn't your security?

Contact Sales