do I contact Cypherix®?
You can always contact us through our contact form found
here. Alternatively, you can directly contact us via
can I find local companies selling Cypherix® products?
We have various distributors/resellers across the globe. You may find their
contact information here
is the difference between Cypherix and Secure IT?
Secure IT is a file encryptor whereas Cypherix is a disk encryptor.
Cypherix creates an encrypted drive in which you can store all your secure
data, while Secure IT does not create such a drive. Secure IT has a built in
shredder and also allows you to encrypt/decrypt using command line.
is the difference between Cypherix LE and Cypherix PE?
Cypherix LE and Cypherix PE have the same features. The only difference is
the capacity of the vault size it can create. Cypherix LE allows you to
create multiple 100 MB vaults, while Cypherix PE allows you to create multiple
25 GB vaults.
is the difference between Cypherix 11.0 and Cypherix SE?
Cypherix 11.0 and Cypherix SE, allow you to create multiple 1000 GB vaults.
Cypherix SE has all the functionalities of Cypherix 11.0. Additionally it
provides corporate users with an auditing feature, namely the Admin Module. It
allows for the recovery of passwords of end users. To illustrate, if an
employee leaves suddenly. In such a case, the data can be accessed by the
corporation without any intervention by Cypherix® or any back doors of any kind.
Cypherix SE provides a single point control and monitoring of the distributed
security system while retaining the privacy of end users who set their own
More information on Cypherix SE can be found here.
do I secure my email?
The Secure e-mail module, a feature present in Cypherix and SecureIT, allows
for the creation of self extracting encrypted files. The recipient need not
have Cypherix/SecureIT installed to decrypt the files, all that is required
is the password. This allows for a totally secure communication system that
makes use of existing generic e-mail clients on a public network, yet allows
for totally secure data transfer.
Secure E-mail types -
1. Standalone files (self executables, .exe ).
These can be decrypted and viewed at the recipient's end on any Windows machine
without any software. All the recipient needs to know is the password/phrase.
Disadvantage: Despite their convenience, these self executing files cause
problems to your recipients as .exe extension is used by many viruses. Many
virus scanners delete executable files automatically.
2. .SIT Files
Given that most virus scanners delete most executable files almost
automatically, Cypherix and SecureIT allows for the creation of .sit
encrypted files. These can be e-mailed to the recipient. We recommend that you
use this method. However the disadvantage is that the recipient needs to
download a free utility DecypherIT to decrypt a .sit file.
More information on DecypherIT can be found here
are the system requirements to use Cypherix® Products?
Cypherix® products work with all 32 bit and 64 bit versions of Microsoft Windows (Windows 95/98/NT4/ME/2000/XP/Windows 2003/Windows Vista /Windows 7 as well as Windows 8), on file systems such as FAT, FAT32, NTFS, NTFS with EFS, etc.