Customer experience matters a LOT.

Simple, easy to use, intuitive are not just words at EB Control.  We are committed to delivering this experience.  However, sometimes things don’t go according to plan.  We’re here to help.

Solution overview

Built on ‘Zero Trust’ principles and NSA-Approved Commercial Level Encryption,  EB Control is the only file sharing solution on the market that gives the data owner complete control across the lifespan of the data. That means not only can EB Control users determine who can access their data, when and where they can access it, but they can also determine for how long. The data owner (or user) can decide to revoke or restrict the data even after it has been distributed. Even if a user has sent pictures, files or a message via email or even WhatsApp to someone else, and that data is on someone else’s system, access can be revoked by the user at any time.

EB Control empowers individuals and organizations (large and small) with unmatched control over their data inside and outside of their network – from source to endpoint. And, unlike other market solutions, neither EBI or EB Control ever accesses or stores user data. Access Rights. Usage Rights. Revocation Rights. EB Control:  Ultimate data privacy, on your terms.

System requirements

The minimum system requirements needed to run EB Control can be found below. For the best experience, we always recommend using the latest publicly available versions of each operating systems (OS).

Desktop

  • Windows
    Windows 10+
    .NET Framework 4.6+
  • MacOS
    OS X 10.14+

Mobile

  • iOS
    iOS14+
  • Android
    Android 8+

Add-ins

  • Outlook for Windows
    Windows 10+
    .NET Framework 4.6+
    Outlook 13+

Web browser

  • Chrome 89+
  • Edge 89+
  • Firefox 87+
  • Safari 14.1+

Account creation & management

Users must create an account to use the EB Control data protection solution.


Account Creation
Creating an account can be done within the EB Control applications and only requires an email address and password.


Account Management
Users can choose to login to their account manually or automatically when the application is started. Users need to be logged into their accounts in order encrypt and decrypt secure containers.

Data protection options

The list of features that allow you to determine who, when, where, and how your data can used.

Access rights

Access rights enable data authors to manage who has access to their secured vault even after it has been shared with others.

Authorized User List
Enables data authors to choose who they want to share their data with.


Read Receipt
Enables data authors to be notified via email the first time an authorized user decrypts a secured vault. Not available for Standard accounts.


Revoke
Enables data authors to prevent all previously authorized users from accessing a secured vault. Not available for Standard accounts.


Shred
Enables data authors to prevent all users, including the data author themselves from accessing a secured vault. Not available for Standard accounts.

User rights

Usage rights enable data authors to manage how their data is used by authorized users after a secure container has been decrypted. Not available for Standard accounts.


Save
Enables data authors to prevent authorized users from saving decrypted data.


Print
Enables data authors to prevent authorized users from printing decrypted data. Preventing printing also prevents authorized users from saving.


Copy
Enables data authors to prevent authorized users from copying decrypted data. Preventing copying also prevents authorized users from printing and saving.


Forward
Enables data authors to prevent authorized users from forwarding decrypted data to others. Preventing forwarding also prevents authorized users from copying, printing, and saving. Only available for Microsoft Outlook Add-in.

Access times

Access timeline enables data authors to manage when their data can be decrypted by authorized users. Not available for Standard accounts.

Start Time
Enables data authors to prevent authorized users from decrypting data before a specific date and time.


End Time
Enables data authors to prevent authorized users from decrypting data after a specific date and time.

Contact & group management

Lists for contacts and groups help data authors easily manage who has access to their data containers. Not available for Microsoft Outlook Add-in.

Contacts
The contact management section allows users to create, edit, and delete contacts.


Groups
The group management section allows users to place multiple contacts into groups, which make sending emails to multiple individuals much easier.

Web portal

Learn how to manage your account as well as the options available to company administrators.

User portal

The user portal shows data specific to an individual account.


Dashboard
The dashboard chart shows the number of encryptions and decryptions that a user has done over the last 90 days.


Profile
The profile page contains user specific data such name, company, country, license details, roles and status. A user can also reset their password.


Devices
Users can get a list of all the devices that have been used with EB Control data protection solution. They can check the date the device was added and the device status. In addition, users can temporarily block, allow, or completely remove devices from their account.

Administrative portal

The administrative portal enables company, reseller, and system administrators to access and manage their accounts.

Company List
The companies list shows all the companies that a user can manage. Only available to reseller and system administrators.


Dashboard
The company dashboard shows a chart detailing the number of encryptions and decryptions that all the users have done over the last 90 days. Additionally, the number of licensed, unlicensed, and pending accounts are shown.


Details
The company details page contains company specific data such name, type, address, and license details.


Users
The users page shows all the users that belong to a company.


Reports
The usage report details the number of encrypts and decrypts performed by each user over a specific date range.

Have a question?

Everything Blockchain, Inc. (OTCMKTS: 0BTX) envisions a future where every transaction is trusted and blockchain is used to attain carbon neutrality, improve healthcare.