Cy4Secure Endpoint Integration

Data protection begins at the client’s computer system no matter if it is a laptop, tablet, terminal, or smartphone or if the user application is native, a web browser application or page. This means data is protected before it leaves an endpoint device or network element and remains secure until the recipients of the data are authenticated to read or use the encrypted data. The Cy4Secure data protection system allows 100% Transparent “No-Touch” enterprise deployments or client “one-touch” 3rd-party application installations. A typical enterprise deployment entails an IT organization or resource first determining the best deployment option for their applications. Depending on the application type the following options are possible for IT:

Application Type


Web Server


Deployment Options

SDK, Addon, Addin, Bona-Data™ Gateway

Browser Plugin,
Bona-Data™ Gateway

SDK, Browser Plugin, Bona-Data™ Gateway

Bonafeyed’s software development kit, SDK, natively supports data encryption within an application created and supported by a developer. It contains a very lightweight no latency encryption function using an 800-bit security algorithm for cipher encoding/decoding. With only 2 code line additions the SDK easily integrates into Javascript, C++, Java, or Python based applications.

Both Web Server and SaaS applications that utilize off the shelf web browsers including Microsoft Windows Edge, Firefox, Google Chrome, and MacOS Safari are supported through a plugin. When data is sent or received, the plugin verifies a user’s permission to use the built-in cryptographic engine to either decrypt or protect data.

3rd party native productivity applications such as Microsoft Office365 are supported using either add-ins or Google G Suite with add-ons. IT can deploy add-ins/ons remotely for these productivity applications. For example, an email program with an addon can encrypt both the body of an email and any attachments. Email addresses are used to identify and authorize recipients of protected emails. Or a paragraph in a document can be encrypted as easily as changing its format. Or a row, column, cell or sheet of a spreadsheet can be separately encrypted. Recipients of these protected data once authenticated and having completed a simple installation of the appropriate add-in/on will be able to see the protected data. Otherwise, the data will remain encrypted.

Mobile devices such as the Apple iPhone or Google Android can leverage Bonafeyed’s foreground universal interface solutions to transparently and seamlessly perform in-line data encryption/decryption operations.

No matter the endpoint device, whether within the same security domain or an external domain, the Cy4Secure system can extend its data security domain so that when encrypted data is lost, stolen, abandoned or forgotten, it remains protected and becomes permanently inaccessible once access is deleted or retired ensuring cyber criminals or internal non-authorized users only obtain unintelligible data.


Endpoint Integration

Developers can Integrate Seamless Data Security Capabilities into Their Applications