Your browser identified itself as a version of IE that was often shipped with default settings that were less than secure. Your internet experience could be made more secure by opening Internet Options in your browser, going to the Advanced tab and looking under the security settings for "Use TLS 1.1" and "Use TLS 1.2". Ensure these are turned on (checked). Doing so will enable your browser to support a higher quality of encryption on this and other websites. You will still be able to browse this site without turning on support for TLS 1.1 and 1.2, but we will have to use a lower level of encryption to accomodate you. See this question on Stack Exchange's Superuser forum from 2011 for more details keeping in mind the comments about TLS 1.2 non-support were made many years ago, and things have changed since then.

If the support for better cryptography has been turned on for your browser, thank you, and you can safely ignore this advisory.

Browser Security Alert

Demo Videos

PKWARE’s Smartcrypt eliminates security gaps by finding, classifying, and protecting sensitive data across the entire enterprise. Smartcrypt provides capabilities no other product can match, allowing each organization to create a tailored data protection solution.

Our Smartcrypt demo videos provide a look at each step in the data-centric security workflow:

Policy Management

The Smartcrypt Enterprise Manager is the central component of the Smartcrypt platform, allowing organizations to maintain control over sensitive data across the enterprise.

Here, you can get a look at Smartcrypt's administration console and see how security administrators can use it to create policies that govern how Smartcrypt agents will identify and protect sensitive data on laptops, desktops, and servers.

Data Discovery

Smartcrypt's data discovery feature uses a software agent to continuously monitor storage locations for sensitive information. Discovery patterns can be used to find all types of sensitive information within files, such as credit card numbers or social security numbers.

In this video, Smartcrypt identifies an Excel file that contains sensitive data (using the example of credit card numbers that require protection under PCI DSS), and then initiates the next steps in the Smartcrypt workflow: classification and protection.


Smartcrypt and Boldon James Classifier integrate seamlessly to find sensitive data, classify files, and apply remediation — including strong encryption — in one automated workflow.

In this video, Smartcrypt identifies a PDF containing patient information that requires encryption under HIPAA. The Smartcrypt agent initiates metatagging via Boldon James Classifier, and then not only encrypts the file, but removes it from an inappropriate location and saves it in a quarantine folder.

Protection and Remediation

Smartcrypt provides a wide range of options for dealing with sensitive information once it has been detected. vailable actions include persistent encryption, quarantine, masking, and deletion.

Using personally identifiable information (PII) as an example, this video demonstrates Smartcrypt's ability to detect sensitive information and protect it using persistent encryption. You'll also see that the end user experience is unchanged—as long as a user is authorized to access a protected file, Smartcrypt decrypts and opens the file automatically.

Audit and Reporting

Organizations can take advantage of Smartcrypt's capabilities to meet their audit and compliance obligations. Classification tags greatly simplify the audit process, while Smartcrypt’s Data Security Intelligence feature provides insight into data protection activity across the organization, making it easy to demonstrate compliance with internal policies, customer requirements, and government mandates.

This video provides a closer look at the tags that Boldon James Classifier can apply to files containing sensitive data, followed by a demonstration of Smartcrypt's ability to generate reports on the presence of sensitive information on user devices. The video also provides a look at another of Smartcrypt's remediation options—deleting unneeded files and creating audit trails to confirm deletion.