Do you want to close?

Yes
No, continue to fill
Name
Email address
Company name
Phone number
Content

Your inquiry has been received.
We will reply to you as soon as possible.

Send
OK
Email address
First name
Last name
Phone number
Company name
Email address
First name
Last name
Phone number
Company name
Modify
Save
Current password
New password
8 or more characters
Upper & lowercase letters
At least one number

Strength

Confirm password
Change
Modify profile
Do you want to close?
Yes
Your privacy is very important to us. INNORIX respects your privacy and is committed to protect the personal information that you share with us. Generally, you can browse through our website without giving us any information. When we do need your personal information to provide services, you will be noticed from us or you can choose to provide us with your personal information. Below statement describes how we collect and use your information.
Overview
The privacy practices of this statement apply to our services available under the domain and subdomains of www.innorix.com (the 'Site'). By visiting this site you agree to be bound by the terms and conditions of this privacy policy.
1. Why we collect the data
Our primary purpose in collecting personal information is to provide you with efficient, and customized experience. We only collect personal information about you that we consider necessary for achieving this purpose.

Once you give us your personal information, you are not anonymous to us. If you choose to use our services, we may require you to provide contact and some other basic information about yourself. We indicate which fields are required and which fields are optional. You always have the option to not provide information by choosing not to use a particular service or feature.
2. Our use of data
We may use your name and email address to inform you of future offers, product developments, and new products we think may be of interest to you based on your previous enquiries and orders. This information is not shared with third parties and you can unsubscribe at any time via phone, email or our website.

If you do not wish to receive these communications, we encourage you to opt out of the receipt of certain communications by sending an email to general@innorix.com to opt-out. You may make changes to your notification preferences at any time.
3. Choice not to provide data
You may choose whether or not to provide personal information to INNORIX. However, when you engage in certain activities on this site, such as ordering products and downloading software, INNORIX requires that you provide certain information about yourself such as name, mailing address, e-mail address and other personal identifying information.
4. Security
Your information is stored on the INNORIX servers. We use procedural and technical safeguards to protect your personal information against loss or theft as well as unauthorized access and disclosure to protect your privacy, including encryption, 'firewalls' and secure socket layers. We employ many different security techniques to protect your precious data from unauthorized access by users inside and outside the company. However, 'perfect security' does not exist on the Internet.
5. Notice
We may amend this privacy policy at any time by posting the amend terms on the site. All amended terms shall automatically be effective 30 days after they are initially posted on the site. In addition, we will notify you in accordance with your notification preferences.

For questions regarding the above privacy policy please contact us at general@innorix.com.
This is a legal agreement between you and INNORIX, for use of the service from the INNORIX which you selected or initiated. “you” refers to the individual and enterprise that registered and/or provided in the INNORIX website.

Any software associated with the services is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. “Data” refers to all information entered from “you” on the company servers in relation to services.
Services
The company may at its sole discretion modify the features of the Services from time to time without prior notice. The company will provide the Services in accordance with this agreement.
Our use of data
We may use your name and email address to inform you of future offers, product developments, and new products we think may be of interest to you based on your previous enquiries and orders. This information is not shared with third parties and you can unsubscribe at any time via phone, email or our website.
Materials posted on this website
All materials that are made available as part of the website services are the copyrighted work of INNORIX or its suppliers. Your use of these materials is governed by one of two sets of license terms. Whether you are presented with a license for the materials or no license is presented to you, these terms apply. INNORIX reserves all rights to the materials expressly granted under these license terms. In your use of the materials you may not:

   • Remove, modify or tamper with any copyright notices;
   • Distribute the materials to third parties, including by posting the materials on any networked computer for access by
     any other computer on the network, or broadcast the materials in any media; or
   • Make any modifications to the materials.

Elements of INNORIX websites are protected by trade dress, trademark, unfair competition, and other laws and may not be copied or imitated in whole or in part. No logo, graphic, sound, or image from any INNORIX website may be copied or retransmitted unless expressly permitted by INNORIX. INNORIX may have trademarks, copyrights, or other intellectual property rights covering subject matter in the materials. By providing the materials to you, INNORIX does not give you any license to these patents, trademarks, copyrights, or other intellectual property, unless INNORIX does so expressly in writing.
Proprietary rights
The company and/or its suppliers, as applicable, retain ownership of all proprietary rights in the services and in all trade names, trademarks, and service marks associated or displayed with the services. You will not remove, deface or obscure any of the company’s or its suppliers’ copyright or trademark notices and/or legends or other proprietary notices on, incorporated therein, or associated with the Services. You may not reverse engineer, reverse compile or otherwise reduce to human readable form any software associated with the services.

For questions regarding the above terms of use please contact us at general@innorix.com.

OK
NO
Secure file transfers are becoming more important
Important information that can affect businesses and organizations resides in files. All kinds of organizations exchange files both in-house and externally with a vast range of organizations. While transferring files, malicious alterations and file theft can happen. It is the reality that many organizations are not even aware that files are being stolen.

Organizations face difficulties when estimating the scale of damage caused by security breaches. Although they can identify a leak, assessing the significance of files, which may include sensitive information from financial institutions or businesses, can be challenging for an organization. Security experts recognize and emphasize the impact this can have on businesses, thus reinforcing the importance of secure file transfers.

Today, investment in security systems for organizations is at an all-time high. To ensure the best security, companies are pouring both money and manpower into security solutions. However, during this process, the security of file transfers has not kept pace with other security measures. This creates a potential security threat to companies daily.
Evolving purposes and methods of security threats
Recently, there has been a definite change in the security threats targeting organizations. In the past, threats such as DDoS directly affected service operations. However, recently, there is only evidence of files being stolen, but the threats do not directly affect the service operation. These threats have raised many questions: 1) Why did they target the service? 2) What is their purpose, for political or commercial reasons? 3) What is the country of origin?

We know for sure that former attacks led by black hat hackers crippled only the service operations. These individuals continuously collect important information and organize with groups who have malicious intentions towards organizations and bureaucracies. We do not know when they will use the information and what their purpose is. Hence, many organizations are concerned about the potential secondary damages.
Relatively weak file transfers
All different kinds of security solutions have already been introduced and used to protect against 1) Direct attacks 2) Detect and treat malignant codes and viruses 3) Protect documents and databases, etc. Except for the file transfer area, IT security has been continuously strengthened. Thus, more security threats are present because the file transfer area can be exploited more easily than other IT areas.
Transferring business files over wireless networks
Many people use laptops and wireless networks to work; however, in-house security can never fully protect file transfers. Although wireless networks have security issues when executing file transfers, wired networks also experience the same threats. Additionally, if companies exchange files daily, they definitely need file transfer security solutions.
Increasing security threat situations
Security attacks have grown more sophisticated over time. Year by year, the number and scale of attacks have been increasing. Attack methods are also more intelligent with the improvement of security solutions. Recently, due to organized domestic attacks, as well as attacks from emerging countries, the overall threat situations have been rapidly increasing.
Key features of secure file transfers
Exacoola provides secure features for specialized file transfers as stated below.

- Advanced multiple en/decryption algorithms

- Making secure channels while transferring

- Safest file transfers in any device OSes

- No impact on existing security policies

- High-speed large-sized file en/decryption

- Integrated with the advanced transfer features

- Triple-layered encryption for metadata

Advanced encryptions for all files
Before starting to transfer files, Exacoola applies advanced encryption algorithms to all files. The encryption ensures that intact files are maintained from the devices to the other devices. Exacoola protects all file transfer processes and also prevents server leakage, enabling all processes to be perfectly protected.
High-speed encryption and decryption for large files
Unlike small data, for large-sized files to be en/decrypted, it takes a considerable amount of time. As a result, engineers' waiting time will depend on the size of the file. When the waiting time increases, business efficiency decreases. To resolve this problem, Exacoola features high-speed en/decryption that is up to 20 times faster than existing methods. Although the speed is faster, the triple-layered encryption protects all files and is much more secure than any other methods.
English

INNORIX America (HQ)

+1 716 835 3333

1140 Avenue of the Americas, New York City, NY, USA

INNORIX Vietnam (Marketing)

+84 28 3636 7993

24A Phan Đăng Lưu, P.6, Q.Bình Thạnh, Tp.HCM, Việt Nam

INNORIX Korea (R&D)

+82 2 557 2757

INNORIX Bldg., 93 Pirundae-ro, Jongno-gu, Seoul, Korea

Contact sales
© 2023 INNORIX
Privacy policy
Terms of use