Contact

mail@gemini-theme.com
+ 001 0231 123 32

Follow

Info

All demo content is for sample purposes only, intended to represent a live site. Please use the RocketLauncher to install an equivalent of the demo, all images will be replaced with sample images.

The email you’re used to, but safe

A highly encrypted email solution that prevents costly data leaks. Integrates easily with Outlook and Gmail and helps you comply with data protection regulations like the GDPR.

Corporate social responsibility includes safeguarding customer data

Become a digital leader when it comes to protecting data and privacy, an area where. Many Fortune 500 companies are currently lagging behind.

Control digital risks

Zivver is the only platform companies need to ensure that employees can easily adhere to organizational data policies. Advanced error prevention technology enables users to catch mistakes in their communications before hitting send, avoiding costly data leaks. Strong user authentication and encryption provide enterprise-grade data protection.

Enable Data Compliance

Zivver’s market leading platform stays on top of evolving data protection laws, to help companies meet regulatory requirements such as the GDPR, DPA or the CCPA. This way your company can stay focused on its core business.

 

 

90% and more of data leaks 

are caused by human!

 90Prozent

 

 

Thousands of messages are sent safely with Zivver every hour
   

Catch email mistakes we’re all guilty of

 

Send information securely

 

Maintain control at all times

 Safe before you hit send with smart technology    Safe from unauthorized access while your message is in transit    Safe for your recipient to access with 2FA, recall email if needed

 

Safe before sending
Real-time alerts prevent data leaks

Whether it’s emailing the wrong person or attaching the incorrect file, Zivver’s smart technology enables you to correct these types of mistakes before hitting send, ensuring you can be compliant with your organization’s data policies.

 Business rules
  Use either standard or customized business rules to ensure that the appropriate level of security for each message is applied each time, and can be easily adjusted as needed. These rules help you stay in control of your information security while also meeting regulatory requirements.
 Two factor authentication (2FA)
  The most secure way to ensure that only intended recipients can access messages you send them. Several options are available when initiating a message for added flexibility.
 Outlook integration
  Seamless integration with Outlook makes it easy to use Zivver from anywhere without changing your way of working.

          

workingatdeskwithzivver 

 



concerned

Safe in transit
Strong security protects your data

Your secure communications will never be intercepted while using Zivver, that’s because of the way we designed our smart technology platform.

Advanced Encryption
  Asymmetric zero-knowledge encryption ensures that no unauthorized people can access your message. Your confidential communications remain truly confidential.
TLS security
  Transport Layer Security (TLS) secures the connection between you and the recipient. We use it so that one else can intercept your communications.

 

 

Safe after sending
Maintain control after sending

Act on mistakes quickly with a simple way to recall email message access, you can use this to mitigate a potential data leak

Free and easy access for recipients
  Anyone can conveniently receive a Zivver message, regardless of where they are or what email they use, and they won’t need to create an account.
Audit logs
  Comprehensive audit and communication logs track all user activity to provide you with better insights and control. These audit logs also help if you need to report a data leak to authorities.
Recall email message
 

If a mistake has been made and you’ve emailed the wrong person, you can quickly restrict access to the communication using the recall email feature.

TIP: if the message is withdrawn before the recipient can access it, Zivver guarantees that the leak has been contained and doesn’t need to be reported to national authorities.

          

kontrollebehalten 

 

 

Download and further informations 

 

Zivver und Office 365 - Warum das Sinn macht !    (Whitepaper)
 Zivver Outlook Plugin - Online Installer
 Zivver Outlook Plugin - Offline Installer

LoadBehavior registry settings

During the installation of Zivver Office Plugin some registry values are set. For Outlook, the LoadBehavior is set. This value decides whether the plugin is loaded while Outlook starts, or not. LoadBehavior can be set per user or per system.

If the Zivver Office Plugin was installed for “just me” - i.e. the current user - then LoadBehavior is set at one of the following locations:

  • Computer\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Outlook\Addins\ZivverOfficePlugin.AddinModule
  • Computer\HKEY_CURRENT_USER\SOFTWARE\Wow6432Node\Microsoft\Office\Outlook\Addins\ZivverOfficePlugin.AddinModule

If the Zivver Office Plugin was installed for “everyone” (all users) then LoadBehavior is set at one of the following locations:

  • Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Outlook\Addins\ZivverOfficePlugin.AddinModule
  • Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Office\Outlook\Addins\ZivverOfficePlugin.AddinModule

Possible values of LoadBehavior are:

  • LoadBehavior = 0 (0x00000000) The plugin is not loaded automatically when Outlook starts. If the user starts the plugin manually, the value remains 0. Therefore, the following time that Outlook is started, the plugin will not be loaded automatically.
  • LoadBehavior = 2 (0x00000002) The plugin is not loaded automatically when Outlook starts. If the user starts the plugin manually and there are no problems with starting, the value is changed to 3 (see below).
  • LoadBehavior = 3 (0x00000003) The plugin is loaded automatically when Outlook starts. If a problem with the plugin is detected, the value will be automatically changed to 2 (see above).

During the Zivver Office Plugin installation, the LoadBehavior key is added and its value is set to 3. When it is uninstalled, the value is removed.

A LoadBehavior value can be adjusted manually in the registry, or you can roll it out to users based on, for example, an application group in the Active Directory. If the LoadBehavior value does not exist, it can be created manually as a DWORD (32-bit) value.

If you set LoadBehavior at user level (HKCU), make sure that there is no value at HKLM. Otherwise the HKLM value is taken as the starting point.