SafeNet ProtectFile software provides data security with fully automated file encryption of unstructured data contained in network drives and file servers.

When an organization knows their confidential data is protected from both external and internal threats, they can focus on growth, gain knowledge through secured collaboration, and enjoy an increase in productivity.

Centralized Administration

ProtectFile is deployed in tandem with KeySecure, offering an unparalleled combination of broad coverage, robust security, and scalability. The solution encrypts sensitive data in flat files such as documents, spreadsheets, and design drawing. Keys and policies are managed on the KeySecure appliance, boosting security and business productivity.

Transparent to Users

With ProtectFile, folder and file encryption is seamless and transparent, so there is no disruption to the business operations, performance, or the end user experience. Once a user has been successfully authenticated, ProtectFile is initiated automatically, applying policies without interfering with productivity.

Security Evolved

ProtectFile enables the next generation of data protection by making security data-centric. As opposed to systems that secure a perimeter or device, ProtectFile secures the data itself, ensuring that data in files is protected throughout its entire life cycle - from inception to storage.

File Encryption Specifications



A file server, web server, application server, database server, or other machine running compatible software

Network Shares



Remote silent installation for easy deployment in any size environment

File Encryption Algorithm


Supported Platforms

Operating Systems

  • Linux: Oracle, Red Had Enterprise Linux, SUSE, Ubuntu
  • Microsoft Windows


  • Cassandra
  • IBM DB2
  • Microsoft SharePoint
  • Microsoft SQL Server
  • mongoDB
  • Oracle


  • Amazon EC2
  • Amazon S3

Big Data

  • Apache Hadoop


  • Data-Centric protection – Granular file encryption and folder level encryption throughout the data life cycle.  
  • Proven cryptographic algorithms – To encrypt all data files, temporary files, and authentication keys. 
  • Transparent Encryption – Data files are transparently encrypted without disruption to the end user. 
  • Controlled Access – Access policies can be defined and enforced with KeySecure and ProtectFile with separation of duties for compliance. 
  • Increased security – Users are authenticated with strong identity protection separately from the administration of the access policies. 


  • Growth Enabled  – When an organization is confident their sensitive data is secured with ProtectFile, they can focus on growing their business in today's dynamic environment. 
  • Collaboration Secured – By utilizing access policies, only authorized, authenticated users can view sensitive unstructured data, enabling collaboration with the next generation of security. 
  • Productivity Empowered  – Because encryption is transparent to the user, there is no disruption to business operations, performance, or the end user experience.