See VIDA in action

Watch just how quickly VIDA works to manage your protected data

What's happening here?

1: The Click

Double-clicking on a protected file triggers VIDA to begin re-assembling the unique private key for it.

Without the private key, all you (or your attacker) would see is this.

2: The Tap

To re-assemble the private key, VIDA begins by contacting your linked devices, each of which holds a fragment of that key.

Each linked device will then request your approval. One tap on big green 'Approve' button and the fragments of the private key are securely transmitted back to your computer.

3: The Response

Once VIDA receives all of the correct private key fragments, they're instantly re-assembled on your computer and used to decrypt and open the file.

Contact Us

Drop us a line to schedule a demo and to learn more about protecting your data with VIDA.