Customer experience matters a LOT.
Simple, easy to use, intuitive are not just words at EB Control. We are committed to delivering this experience. However, sometimes things don’t go according to plan. We’re here to help.
Built on ‘Zero Trust’ principles and NSA-Approved Commercial Level Encryption, EB Control is the only file sharing solution on the market that gives the data owner complete control across the lifespan of the data. That means not only can EB Control users determine who can access their data, when and where they can access it, but they can also determine for how long. The data owner (or user) can decide to revoke or restrict the data even after it has been distributed. Even if a user has sent pictures, files or a message via email or even WhatsApp to someone else, and that data is on someone else’s system, access can be revoked by the user at any time.
EB Control empowers individuals and organizations (large and small) with unmatched control over their data inside and outside of their network – from source to endpoint. And, unlike other market solutions, neither EBI or EB Control ever accesses or stores user data. Access Rights. Usage Rights. Revocation Rights. EB Control: Ultimate data privacy, on your terms.
The minimum system requirements needed to run EB Control can be found below. For the best experience, we always recommend using the latest publicly available versions of each operating systems (OS).
.NET Framework 4.6+
OS X 10.14+
- Outlook for Windows
.NET Framework 4.6+
- Chrome 89+
- Edge 89+
- Firefox 87+
- Safari 14.1+
Account creation & management
Users must create an account to use the EB Control data protection solution.
Creating an account can be done within the EB Control applications and only requires an email address and password.
Users can choose to login to their account manually or automatically when the application is started. Users need to be logged into their accounts in order encrypt and decrypt secure containers.
Data protection options
The list of features that allow you to determine who, when, where, and how your data can used.
Access rights enable data authors to manage who has access to their secured vault even after it has been shared with others.
Authorized User List
Enables data authors to choose who they want to share their data with.
Enables data authors to be notified via email the first time an authorized user decrypts a secured vault. Not available for Standard accounts.
Enables data authors to prevent all previously authorized users from accessing a secured vault. Not available for Standard accounts.
Enables data authors to prevent all users, including the data author themselves from accessing a secured vault. Not available for Standard accounts.
Usage rights enable data authors to manage how their data is used by authorized users after a secure container has been decrypted. Not available for Standard accounts.
Enables data authors to prevent authorized users from saving decrypted data.
Enables data authors to prevent authorized users from printing decrypted data. Preventing printing also prevents authorized users from saving.
Enables data authors to prevent authorized users from copying decrypted data. Preventing copying also prevents authorized users from printing and saving.
Enables data authors to prevent authorized users from forwarding decrypted data to others. Preventing forwarding also prevents authorized users from copying, printing, and saving. Only available for Microsoft Outlook Add-in.
Access timeline enables data authors to manage when their data can be decrypted by authorized users. Not available for Standard accounts.
Enables data authors to prevent authorized users from decrypting data before a specific date and time.
Enables data authors to prevent authorized users from decrypting data after a specific date and time.
Contact & group management
Lists for contacts and groups help data authors easily manage who has access to their data containers. Not available for Microsoft Outlook Add-in.
The contact management section allows users to create, edit, and delete contacts.
The group management section allows users to place multiple contacts into groups, which make sending emails to multiple individuals much easier.
Learn how to manage your account as well as the options available to company administrators.
The user portal shows data specific to an individual account.
The dashboard chart shows the number of encryptions and decryptions that a user has done over the last 90 days.
The profile page contains user specific data such name, company, country, license details, roles and status. A user can also reset their password.
Users can get a list of all the devices that have been used with EB Control data protection solution. They can check the date the device was added and the device status. In addition, users can temporarily block, allow, or completely remove devices from their account.
The administrative portal enables company, reseller, and system administrators to access and manage their accounts.
The companies list shows all the companies that a user can manage. Only available to reseller and system administrators.
The company dashboard shows a chart detailing the number of encryptions and decryptions that all the users have done over the last 90 days. Additionally, the number of licensed, unlicensed, and pending accounts are shown.
The company details page contains company specific data such name, type, address, and license details.
The users page shows all the users that belong to a company.
The usage report details the number of encrypts and decrypts performed by each user over a specific date range.
Have a question?
Everything Blockchain, Inc. (OTCMKTS: 0BTX) envisions a future where every transaction is trusted and blockchain is used to attain carbon neutrality, improve healthcare.