Quatrix Vault  icon
Quatrix Vault  icon

Quatrix Vault

Tokenization Solution for Data Protection. Quatrix Vault® is an innovative solution developed to manage the secure storage of sensitive files.

Quatrix Vault  screenshot 1

Cost / License

  • Subscription
  • Proprietary

Platforms

  • Mac
  • Windows
  • Linux
  • Online
  • Chrome OS
-
No reviews
0likes
0comments

Features

Suggest and vote on features
  1.  Tokenization
  2.  Data Vault

 Tags

  • secure-vault
  • vault-app
  • encrypted-password-vault
  • file-vault
  • token-authentication
  • token

Quatrix Vault News & Activities

Highlights All activities

Recent News

Show more news

Recent activities

No activities found.

Quatrix Vault information

  • Developed by

    GB flagMaytech
  • Licensing

    Proprietary and Commercial product.
  • Pricing

    Subscription that costs $9 per month.
  • Alternatives

    1 alternatives listed
  • Supported Languages

    • English

Popular alternatives

View all
Quatrix Vault was added to AlternativeTo by Maytech on and this page was last updated .
No comments or reviews, maybe you want to be first?
Post comment/review

What is Quatrix Vault ?

Our technology uses tokenization to greatly reduce the risks associated with large-scale data breaches. It provides highly secure, PCI compliant, off-site storage for credit card details and other highly sensitive documents such as those covered by HIPAA in the US or GDPR in the EU.

Quatrix Vault® is an innovative solution developed to manage the secure storage of sensitive files. By encrypting the data using a split-key system, it becomes unreadable unless unlocked by the full key, completed by the owner on retrieval.

This powerful technique enables the secure, off-site storage of credit card details in accordance with PCI compliance, but can also be applied to files of any type or size, and can be fully integrated via an api into your existing systems.

The added layer of security means that each time a file is accessed, a new encryption key is generated. If any unusual activity is discovered (multiple requests, for example) then the system is locked until verification of authorization is provided, making data harvesting extremely difficult.

In addition to more traditional forms of data security, this makes it virtually impossible for a large-scale data breach to occur, lending itself well to the storage of credit-card details, but could equally protect large numbers of patient records, commercially sensitive documents or personal customer details.

Official Links