Frequently Asked Questions
How does Kojensi differ to other services?
Security controls ensure the end user is the custodian of their own data
Kojensi enables users to set rules for access to files and documents, including the security classification, organisation name, and country. Users can only see or access a document or file if they meet those rules set for the document. Users can also set the level of read/write access others can have on workspaces and documents.
Secure co-authoring of sensitive/classified documents
Kojensi allows users to co-author sensitive and classified files, including documents, spreadsheets and presentations. Organisations can use Kojensi to share and co-author documents up to PROTECTED in an accredited cloud-based application, or higher-level documents in an on-premise or private cloud solution.
Distributed administration saves users time and reduces administrative overheads
There are no super users inside of Kojensi, users have complete control and visibility over the documents and files they contribute. Each user is able to set up secure Workspaces and decide the security controls and levels applied to both Workspaces and individual documents. This saves users time empowering them to get started and work straight away.
Is Kojensi only limited to Documents, Spreadsheets and Presentations?
There are no limits to the type of file users can share using Kojensi. This means that any file can be shared securely, for example:
- Videos & Images;
- CAD drawings; and/or
Online co-authoring is supported for multiple people working on documents, spreadsheets and presentations together.
Who can use Kojensi?
Kojensi can be used by individuals from any organisation, making it perfect for use within and between Government, Defence, Industry, Universities etc. Kojensi provides all users with a secure place to collaborate.
What makes Kojensi more secure than other platforms?
Kojensi uses a security methodology called Attribute Based Access Control (ABAC), which enables users to have a greater level of control over how their information is shared and accessed. Attributes (such as the security classification, organisation name, and country) can be added to documents and files, giving the owner of the information full control who accesses it.