top of page

TwoFiftySix

Collaborate with Confidence: Encrypted Attachments, File Sharing and Data Transfer

OUR PLATFORM

Use cases for our encrypted content delivery network

01

Sensitive Email Attachments 

Access to sensitive email attachments are often only a forward away. TwoFiftySix end-to-end encryption ensures that data is only readable by the sender and intended recipients.

02

Confidential File Sharing

File sharing solutions provide a convenient but flawed mechanism to deal with confidential file sharing. TwoFiftySix enables user managed keys, comprehensive virus scanning and strict access controls by time, views and location. All logged for tracability.

03

Hold your own encryption keys

Even with robust processes, data in the majority of solutions are often stored unencrypted on servers or encrypted with solution provider keys. This makes them vulnerable to unauthorised access, or subpoenas. With TwoFiftySix the data remains encrypted with your own keys, at rest and in transit.

04

Secure SaaS Integration

TwoFiftySix can encrypt data before it leaves one SaaS platform and ensure it remains encrypted until it is received and decrypted by another SaaS application. It does this with minimal administration automating the encryption key lifecycle management, ensuring keys are securely generated, stored, and retired.

05

Control your Data Sovereignty

TwoFiftySix ensures data sovereignty by encrypting data at rest and in transit, allowing only local decryption and enforcing strict data residency policies. This guarantees that data is stored and processed within legal jurisdictions, aligning with local compliance and regulatory requirements.

ABOUT

All about
TwoFiftySix

TwoFiftySix is the perfect solution for the unparalleled encryption of attachments, file sharing & data migration. With comprehensive end-to-end encryption powered by the Libsodium cryptography, TwoFiftySix is designed to cost effectively protect your most sensitive data in the throws of business.

Born from a vision of absolute data security and with the backing of a significant financial organisation, TwoFiftySix is the product of over 3 years of research and development by a team of experienced developers, including with expertise from Silicon Valley and the UK in cutting-edge technology and cybersecurity.  This provided the foundation for TwoFiftySix to become the robust platform it is today, featuring best in class end-to-end encryption, automated key management, and comprehensive access controls tailored to the most demanding data privacy requirements.

TwoFiftySix is now wholly owned by Cognitiv Ventures, a New Zealand based company focused on commercialising next-gen technology innovations. With Cognitiv Ventures’ support, TwoFiftySix has refined its offerings to serve not only large enterprises but also the mid-market segment, making premium data security accessible to a broader range of businesses.

 

Today, TwoFiftySix is more than just a security platform; it is a commitment to safeguarding data through superior technology and innovation. We empower organisations across the globe to protect their most valuable assets with confidence and ensure compliance with the strictest data protection regulations. Join us in our mission to redefine data security and experience peace of mind with TwoFiftySix.

FAQ

You're probably
wondering...

  • How is TwoFiftySix Licensed?
    TwoFiftySix can be licensed in two ways, through a SaaS Agreement or a Self Hosted Application (SHA) License. The SaaS Agreement is completely hosted and managed by TwoFiftySix and starts from $5 NZD per user per month. The SHA License is self hosted and managed by the customer in their own public cloud infrastructure. A SHA License begins at $5000 NZD per month.
  • Does TwoFiftySix offer professional services
    TwoFiftySix offers professional services for the implementation of a Self Hosted solution into a customers environment. This is done through various implementation partners throughout New Zealand and Australia.
  • What makes TwoFiftySix more secure than solutions like Dropbox?
    While Dropbox encrypts data in transit and at rest, it manages the encryption keys, potentially accessing user data. TwoFiftySix enhances security by implementing true end-to-end encryption, where only the client controls the decryption keys, ensuring that no third party, including TwoFiftySix, can access the encrypted data.
  • In what ways is SecureX’s approach to data sovereignty and compliance superior to that of solutions like Office 365 and Dropbox?
    TwoFiftySix prioritises data sovereignty by ensuring that all data is encrypted with keys controlled by the user, not the platform. This means data can be stored and processed within specific jurisdictions to comply with local laws—a significant advantage for global businesses facing diverse regulatory environments, unlike Office 365 and Dropbox, which may store and process data in multiple locations subject to different laws.
  • How does TwoFiftySix offer better security than SFTP?
    Unlike SFTP, which only secures file transfers and requires complex setup and key management, TwoFiftySix provides end-to-end encryption for both data at rest and in transit. It also automates key management and includes comprehensive logging and auditing capabilities to ensure a higher level of security and easier compliance.
  • How does TwoFiftySix compare to Office 365 in terms of email security?
    Office 365 provides basic encryption for emails; however, TwoFiftySix offers more robust email protection through end-to-end encryption that ensures emails remain encrypted until they reach the intended recipient. This is unlike Office 365, where decrypted data might reside on Microsoft’s servers, making it accessible under certain conditions.
  • Does TwoFiftySix provide any advantages over common file sharing solutions when it comes to access control?
    TwoFiftySix offers more granular access control and permissions than solutions like Dropbox, allowing administrators to set detailed user permissions and track file access extensively. TwoFiftySix’s permissions include time-bound access, where file availability is limited to a specific timeframe, recipient-bound controls that ensure only specified individuals can access the data, and geography-bound restrictions that limit access based on the user’s location. Additionally, TwoFiftySix’s use of end-to-end encryption and private key storage means that shared files are only accessible by intended recipients, unlike Dropbox where files can be accessed by anyone with the link if not properly secured. This layered approach to permissions not only enhances security but also provides superior control over how data is shared and accessed, tailored to meet specific organisational needs and compliance requirements.

Get
in Touch

bottom of page