Excelitte - Our Cyber Security Toolset provides 100% Data Loss Prevention (DLP) using: Encryption, Automatic/Backup & Recovery, Phishing Message Scanning, Shared Auto Protect to secure data in spreadsheets, files, images, videos, archived emails etc.





EXCELITTE CYBER SECURITY PRODUCT OFFERING


Excelitte Phishing Message Scanner

images description

Excelitte Phishing Message Scanner is a web-based cybersecurity tool that analyses URLs or attachments from suspicious messages to protect users from potential threats.


Excelitte Scanner

Excelitte Data Capture from Spreadsheets and Stored in a Secure Encrypted Format

images description

Excelitte Encrypted Data Capture transforms your spreadsheet data into a secure web-based database application, encrypts it automatically, and ensures access only through 3-Factor authentication.

Excelitte Secure Data Capture

Excelitte Encrypted File - Single & Group Usage

images description

Excelitte File Encryption enables users to securely share encrypted files with multiple users or teams via email or any cloud storage service.

Excelitte Data Encryption, File Encryption and File Share

Excelitte.AI

images description

Excelitte.AI is an Artificial Intelligence/Machine Learning (AI/ML) module that uses learnt intelligence to proactively seek out and defend preemptively all cybersecurity attacks.

Excelitte.AI's point of difference is that it employs both an Offensive and Defensive Approach to combatting cyberattacks & ransomware.



Excelitte Data Encryption, File Encryption and File Share

Excelitte partners & collaborates with Australia Cyber Security Center (ACSC - Ministry of defence) to share both classified and unclassified information on cyber threat actors, assessments, and all related Cyber Security data in real time.

Excelitte Web Crawler is a platform powered by a software bot that continuously scours the web and the dark web, collecting information on Cybercriminal locations, infrastructure, and other topics. It is free to use and the first of its kind in its focus on capturing/disseminating information on Cybercrime actors.

EXCELITTE CYBERSECURITY TOOLS

IN A NUTSHELL

images description
&

AUTO-TRANSFER YOUR DATA

Excelitte Data Capture automates the process of transferring/relocating your spreadsheet data to a database, secures it from ransomware attacks in seconds, and can recover the data if lost, no matter the circumstance.

&

INSTANT CONVERSION

Excelitte Data Capture imports or captures your data from a spreadsheet and transforms it into a web application in an instant, literally in seconds. Example 1 million rows of data can be captured and transformed in approximately 40 seconds.

&

EXCELITTE DATA CAPTURE CATERS FOR SMALL, MEDIUM, AND ENTERPRISE ORGANISATIONS

In a nutshell, Excelitte Data Capture secures data stored in its database or PC based files for individuals or sole traders, small, medium, and enterprise organisations. You can protect your data in seconds since there is no need to install software or have a technical background.

EXCELITTE TILL DATE HAS SECURED

FILES
EXCELITTE TILL DATE HAS PROTECTED

GB OF DATA
NUMBER OF CYBER ATTACKS REPELLED

ATTACKS
NUMBER OF PHISHING MESSAGES DETECTED

MESSAGES

Collaborate and share with your colleagues sensitive files or information such as healthcare data with a 100% guarantee that it can't be hacked or ransomwared.

Sign up to use Excelitte as follows;

Tier 1
(SaaS)

FREE
No Credit Card Required
  • Single User Account
  • Can convert, migrate, and encrypt up to 1000 spreadsheet records
  • Can encrypt up to 5 files

Tier 2
(SaaS)

A$ 389.00
/Per Month, Billed Annually
  • 5 User Accounts
  • Can convert, migrate, and encrypt up to 20,000 spreadsheet records
  • Can encrypt up to 25 files
  • 7 day free trial

Small/Large Business Dedicated Cloud Server
(Non-SaaS)

Pricing available on request
Hosted on dedicated managed cloud server


  • Unlimited User Accounts
  • Can convert, migrate, and encrypt unlimited spreadsheet records
  • Can encrypt unlimited files
  • Usage subject to the host resources
  • Complementary penetration test

Enterprise version
(Non-SaaS)

Pricing available on request
Hosted on your server


  • Unlimited User Accounts
  • Can convert, migrate, and encrypt unlimited spreadsheet records
  • Can encrypt unlimited files
  • Usage subject to the host resources
  • Complementary penetration test