CUSTOMERS
ABOUT US
langIcon English
Features (6)
License
Brochure
22 pages
Videos (4)
Texts (6)
Features (5)
Brochure
24 pages
Videos (1)
Brochure
22 pages
Videos (8)
Module test
Brochure
24 pages
Videos (3)

The detailed specifications have changed, so please check again.

Undo

Not available

Cloud factory service is not available in your country.

OK
FILE TRANSFER PRODUCTS

Exabyter

Web-based file transfers that is easily embedded in any web systems.

Exacoola

Hybrid file transfers between servers, user devices and object storage.

VISION AI PRODUCTS

Al.bert

Collect and analyze traffic information in real-time from all cameras across the city.

IP CAMERA PRODUCTS

Costomi

24/7 order and production for 30 types of IP cameras such as Dome, Bullet and PTZ, etc.

MEMBERS

Sign in

Sign up

COMPANY

About us

Customers

Contact us

OK
NO

Order no. Product Status Date
O1111-1111-1111 INX-DD2222 X 100 INX-DD2222 X 10 INX-DD2222 X 1 Shipping 21 Sep. 2022
O1111-1111-1111 INX-DD2222 X 100 Shipping 21 Sep. 2022
O1111-1111-1111 INX-DD2222 X 100 Shipping 21 Sep. 2022
View
View
View
common.getQuote
layer.helpText1
INNORIX Facial Recognition AI / Smart Traffic AI / Exabyter / Exchanger / WP / Exacoola / Smart IP Cameras /
fileInfo.Title1
Facial AI
Traffic AI
IP Camera
fileInfo.Title2
Exabyter
Exchanger
common.next

SALES INQUIRY

Your inquiry has been received.
We will reply to you as soon as possible.

Ok
common.askQuestion
layer.helpText2
INNORIX Facial Recognition AI / Smart Traffic AI / Exabyter / Exchanger / WP / Exacoola / Smart IP Cameras /
fileInfo.Title1
Facial AI
Traffic AI
IP Camera
fileInfo.Title2
Exabyter
Exchanger
common.next
SALES INQUIRY
TECHNICAL INQUIRY
PARTNER INQUIRY
GENERAL INQUIRY
GET A QUOTE
ASK A TECHNICAL QUESTION
TALK TO SALES TEAM
TALK TO TECHNICAL TEAM
DOWNLOAD BROCHURE
Please fill the form below. You will receive a brochure download link by email.
Request a demo
INNORIX Smart Traffic AI
Request a demo
INNORIX Facial AI
Request a free trial account Request a free trial version Request a brochure Request a quote Ask a technical question
INNORIX Facial Recognition AI Smart Traffic AI Exchanger WP Exabyter Smart IP Cameras
layer.helpFaile
Ok
exatour.code.copied
Ok
Do you want to close?
Yes
No, continue to fill
INNORIX uses cookies to ensure that we give you the best experience on our website.
If you continue we assume that you consent to receive all cookies on all pages
Yes
No
exatour.forms.content7
exatour.forms.content3
exatour.forms.content8
layer.notPlayVideo

MY PROFILE

Email address
First name
Last name
Phone number
Company name
Email address
First name
Last name
Number
Company name

CHANGE PASSWORD

Current password
New password
8 or more characters
Upper & lowercase letters
At least one number

Strength

Confirm password

Those passwords didn’t match.

Profile has been modified successfully.

Account
Test storage
Free cloud storage for Exabyter testing. Upload files will not be actually saved in the storage. Downloads can be tested with the sample files.
Monitor & Track server
With the Monitor & Track, you can monitor all file transfer status in real-time and track the recorded transfer history.
GET A TRIAL KEY
Test license key issuance has been completed.
Please check your email.
Ok
DOWNLOAD PACKAGE
The package download request has been received
A download link will be sent to your email
null.
Ok

TALK TO TECHNICAL TEAM

First name
Last name
Phone number
Email address
Company name
Domain address
Content

Preferred way of support

Email

Email
Video call
Remote support
Messenger
Email address

Your preferred date and time

02:00 PM

00:00 AM
01:00 AM
02:00 AM
03:00 AM
04:00 AM
05:00 AM
06:00 AM
07:00 AM
08:00 AM
09:00 AM
10:00 AM
11:00 AM
12:00 PM
01:00 PM
02:00 PM
03:00 PM
04:00 PM
05:00 PM
06:00 PM
07:00 PM
08:00 PM
09:00 PM
10:00 PM
11:00 PM

Your preferred date and time

02:00 PM

00:00 AM
01:00 AM
02:00 AM
03:00 AM
04:00 AM
05:00 AM
06:00 AM
07:00 AM
08:00 AM
09:00 AM
10:00 AM
11:00 AM
12:00 PM
01:00 PM
02:00 PM
03:00 PM
04:00 PM
05:00 PM
06:00 PM
07:00 PM
08:00 PM
09:00 PM
10:00 PM
11:00 PM

WhatsApp

WhatsApp
Messenger
WeChat
LINE
Telegram
Send

Your inquiry has been received.
We will reply to you as soon as possible.

Ok

Online self check

Checking your Exabyter automatically, Enter the URL address and click “Start” button.

Domain address
Start

http://www.innorix.com/Exabyter/upload.html

Checking now (10/20)

Cancel

The self check is finished

http://www.innorix.com/Exabyter/upload.html Retry

Found 10 problems out of 20.

See report

Can not found innorix.js

Have no permission the save path

Check again

Can not found innorix.css

Check again
OK

VIDEO CALL

First name
Last name
Phone number
Email address
Company name
Domain address
Content

Your preferred date and time

02:00 PM

00:00 AM
01:00 AM
02:00 AM
03:00 AM
04:00 AM
05:00 AM
06:00 AM
07:00 AM
08:00 AM
09:00 AM
10:00 AM
11:00 AM
12:00 PM
01:00 PM
02:00 PM
03:00 PM
04:00 PM
05:00 PM
06:00 PM
07:00 PM
08:00 PM
09:00 PM
10:00 PM
11:00 PM
Send

Your inquiry has been received.
We will reply to you as soon as possible.

Ok

REMOTE SUPPORT

First name
Last name
Phone number
Email address
Company name
Domain address
Content

Your preferred date and time

02:00 PM

00:00 AM
01:00 AM
02:00 AM
03:00 AM
04:00 AM
05:00 AM
06:00 AM
07:00 AM
08:00 AM
09:00 AM
10:00 AM
11:00 AM
12:00 PM
01:00 PM
02:00 PM
03:00 PM
04:00 PM
05:00 PM
06:00 PM
07:00 PM
08:00 PM
09:00 PM
10:00 PM
11:00 PM
Send

Your inquiry has been received.
We will reply to you as soon as possible.

Ok

MESSENGER CHAT

First name
Last name
Phone number
Email address
Company name
Domain address
Content

WhatsApp

WhatsApp
Messenger
WeChat
LINE
Telegram
Send

Your inquiry has been received.
We will reply to you as soon as possible.

Ok

EMAIL INQUIRY

tech@innorix.com Copy to clipboard

OK

ONLINE INQUIRY

First name
Last name
Phone number
Email address
Company name
Domain address
Content
Send

Your inquiry has been received.
We will reply to you as soon as possible.

Ok
Do you want to close?
Yes
No, continue to fill
This link has been expired.
Move to sign in

Addresses

Website address

https://www.innorix.com

https:/www.exabyter.com

Monitor and track

https://mrt.innorix.com

License

var INNORIX_LICENSE = "804|235|342|217|20220428|20220528|161|" var INNORIX_SIGNATURE = "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" var INNORIX_KEY =

Copy to clipboard

My inquiry - B2341 4899 8734 WaitingWaitingCompleted

Type

Technical inquiry

Address

https://innorix.com

Content

Preferred way of support

Remote control (12:00AM 17 May. 2022)

Data leakages in transfers, why businesses must be more cautious than ever?

In this data-centric business era, data has become essential to business operations. Therefore, data leakage represents the most severe risk for any business, especially in the transition to remote workspaces. Businesses invest heavily in security measures to prevent cyber threats from impacting the transfer process of data exfiltration. Despite many research efforts on safeguarding sensitive information have been conducted, businesses continue to struggle with dire security challenges.

Modern data breach statistics

According to Ponemon Institute’s 2022 Cost of Data Breach Report, the average consolidated cost of a data breach has reached the all-time high of $4.4 million, marking a 2.6% increase from a year ago and a 13% jump since 2020. Another critical number is that 83% of organizations across industries have experienced more than one security breach in their lifetime. Many of the highest-cost breaches involved critical infrastructure sectors, leading the critical infrastructure to become an increasingly tempting target for both nation-state attackers and cybercriminals in recent years.

Costs of data breaches to an enterprise

The extreme challenge for today’s IT operations teams is how to control the transfer of sensitive data across systems without obstructing legitimate business operations and incurring cyber risks. Businesses that apply free, unsecured, insufficient file transfer technologies endanger themselves with packet loss, ransomware, phishing, reconnaissance, and a whole range of cyber threats, leading to data exfiltration.

Many industries request to share Personally Identifiable Information (PII), including copies of passports, driver’s licenses, bank details, patient details, financial status, etc., for compliance purposes. However, with the imposition of regulatory compliance mandates, businesses must be extremely vigilant than ever in implementing new file transfer technologies to the system. Deploying unreliable file transfer technologies can lead to data exfiltration of PII, the most valuable asset of every business. Leakage of PII and other sensitive information introduces businesses to severe financial and reputational sanctions, devasting the long-term stability of the business.

Transfer digital assets with double integrity verification

The most reliable alternative for businesses against ever-advancing decryption technologies of cyber-terrorism is to deploy an enterprise-class file transfer solution, enabling an end-to-end approach that autonomously surveillance the whole process from the endpoint of senders to the endpoint of receivers, with all files transported across the systems securely. With the double integrity verification technology, Exabyter provides constant technology layers to counter the infiltration of cyberattacks throughout the system.

How does the double integrity verification technology work?

File alterations occur due to cybercriminals infiltrating the networks using decryption algorithms or malignant codes embedded into files in transport. To remediate these risks, Exabyter implements an end-to-end approach by verifying file integrity twice (each block of the file, and then the whole file again).

Specifically, each file will be encrypted before transferring to ensure the highest security for files if cyberattacks occur. Then the files will be compressed into one bulk file and encrypted again to create two technology layers. Then the total file will be sent, only when the bulk file successfully reaches the end-point address, the system will run a decryption program to read the data in the files.

Even if an altered part of a file is detected, only that part will be automatically retransferred to ensure the precision and reliability of the transfer.

About INNORIX, the Exabyter provider

INNORIX, with over 20 years of experience in the development of file transfer technology, has continuously upgraded Exabyter to transfer data at enterprise-level security regardless of file size, types, transmit distances, and network conditions. Constantly updating encryption algorithms to counter the ever-evolving decryption algorithms of cyberterrorists, Exabyter provides a file transfer solution with optimum reliability and security for partners.

Exabyter is trusted to be deployed by enterprises all over the world to transfer business-critical digital assets.

Back to list
Privacy policy
Terms of use
langIcon English
  • English
  • 한국어
  • tiếng Việt
  • Bahasa
  • ภาษาไทย
  • Filipino
  • हिन्दी
  • Français
  • italiano
  • Português
  • Español
  • Deutsch
  • Росси́я
  • Nederlands
  • العربية
  • Kiswahili
Privacy policy
Your privacy is very important to us. INNORIX respects your privacy and is committed to protect the personal information that you share with us. Generally, you can browse through our website without giving us any information. When we do need your personal information to provide services, you will be noticed from us or you can choose to provide us with your personal information. Below statement describes how we collect and use your information.
Overview
The privacy practices of this statement apply to our services available under the domain and subdomains of www.innorix.com (the 'Site'). By visiting this site you agree to be bound by the terms and conditions of this privacy policy.
1. Why we collect the data
Our primary purpose in collecting personal information is to provide you with efficient, and customized experience. We only collect personal information about you that we consider necessary for achieving this purpose.

Once you give us your personal information, you are not anonymous to us. If you choose to use our services, we may require you to provide contact and some other basic information about yourself. We indicate which fields are required and which fields are optional. You always have the option to not provide information by choosing not to use a particular service or feature.
2. Our use of data
We may use your name and email address to inform you of future offers, product developments, and new products we think may be of interest to you based on your previous enquiries and orders. This information is not shared with third parties and you can unsubscribe at any time via phone, email or our website.

If you do not wish to receive these communications, we encourage you to opt out of the receipt of certain communications by sending an email to general@innorix.com to opt-out. You may make changes to your notification preferences at any time.
3. Choice not to provide data
You may choose whether or not to provide personal information to INNORIX. However, when you engage in certain activities on this site, such as ordering products and downloading software, INNORIX requires that you provide certain information about yourself such as name, mailing address, e-mail address and other personal identifying information.
4. Security
Your information is stored on the INNORIX servers. We use procedural and technical safeguards to protect your personal information against loss or theft as well as unauthorized access and disclosure to protect your privacy, including encryption, 'firewalls' and secure socket layers. We employ many different security techniques to protect your precious data from unauthorized access by users inside and outside the company. However, 'perfect security' does not exist on the Internet.
5. Notice
We may amend this privacy policy at any time by posting the amend terms on the site. All amended terms shall automatically be effective 30 days after they are initially posted on the site. In addition, we will notify you in accordance with your notification preferences.

For questions regarding the above privacy policy please contact us at general@innorix.com.
Terms of use
This is a legal agreement between you and INNORIX, for use of the service from the INNORIX which you selected or initiated. “you” refers to the individual and enterprise that registered and/or provided in the INNORIX website.

Any software associated with the services is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. “Data” refers to all information entered from “you” on the company servers in relation to services.
Services
The company may at its sole discretion modify the features of the Services from time to time without prior notice. The company will provide the Services in accordance with this agreement.
Our use of data
We may use your name and email address to inform you of future offers, product developments, and new products we think may be of interest to you based on your previous enquiries and orders. This information is not shared with third parties and you can unsubscribe at any time via phone, email or our website.
Materials posted on this website
All materials that are made available as part of the website services are the copyrighted work of INNORIX or its suppliers. Your use of these materials is governed by one of two sets of license terms. Whether you are presented with a license for the materials or no license is presented to you, these terms apply. INNORIX reserves all rights to the materials expressly granted under these license terms. In your use of the materials you may not:

   • Remove, modify or tamper with any copyright notices;
   • Distribute the materials to third parties, including by posting the materials on any networked computer for access by
     any other computer on the network, or broadcast the materials in any media; or
   • Make any modifications to the materials.

Elements of INNORIX websites are protected by trade dress, trademark, unfair competition, and other laws and may not be copied or imitated in whole or in part. No logo, graphic, sound, or image from any INNORIX website may be copied or retransmitted unless expressly permitted by INNORIX. INNORIX may have trademarks, copyrights, or other intellectual property rights covering subject matter in the materials. By providing the materials to you, INNORIX does not give you any license to these patents, trademarks, copyrights, or other intellectual property, unless INNORIX does so expressly in writing.
Proprietary rights
The company and/or its suppliers, as applicable, retain ownership of all proprietary rights in the services and in all trade names, trademarks, and service marks associated or displayed with the services. You will not remove, deface or obscure any of the company’s or its suppliers’ copyright or trademark notices and/or legends or other proprietary notices on, incorporated therein, or associated with the Services. You may not reverse engineer, reverse compile or otherwise reduce to human readable form any software associated with the services.

For questions regarding the above terms of use please contact us at general@innorix.com.