Skip to Content
Image

HYKER Share

Securely store and share confidential information

Image

With HYKER Share, you get an encrypted space, where you can create separate secure zones for different areas of operation, projects, or collaboration partners.
Each zone is isolated and meets high standards for information security, making it possible to store and share confidential information with both internal and external parties – without compromising control or integrity.
The solution is designed to support the Swedish total defense's requirements for secure information management.

Secure file sharing
Store and share documents with end-to-end encryption in secure zones
High-security authentication
Choose between BankID or 2-factor authentication for your users
User-friendly
No training is required to get started or use the service
Permissions
Customize access rights to suit your needs
Activity log
A secure activity log gives you control over all events
Administration
Easily manage groups and settings directly in the service

Securely share information

Image

Security based on end-to-end encryption

  • End-to-end encryption
  • Secure key management
  • Swedish Data Center

End-to-end encryption (E2EE) means that the information is encrypted, in an unbroken chain, throughout its lifecycle. From the time a file is sent, received, stored, and all the way to the day the file is deleted. Another advantage is that we use Trusted Hardware (Intel SGX) to ensure the integrity of the distribution of public keys, so that a single public key server cannot compromise the security of the entire system. All information stored in HYKER's systems is stored under Swedish law in Swedish data centers and all systems are managed by security-classified personnel.

Image

Easy to get started and use

  • BankID
  • No installation
  • Computer and mobile-friendly


With HYKER Share, there’s no need to download software, configure settings, or train users to get started. The service is entirely web-based, allowing you to easily invite users who authenticate via BankID or two-factor authentication (no passwords allowed). You can customize permissions for both information and users, such as read-only access, upload/download privileges, and more.

Image
Patrik Aarnivaara – Dev. Frontend/UX

Do you want to know more?