
Simple. Affordable. Transparent to users.
A global first: real-time, in-use encryption for CAD files
For the first time, CAD drawings stay encrypted while they’re being used.
Even if a hacker breaches your network or a file is exfiltrated, the data remains unreadable without authorization.

Why protecting CAD matters?
Foreign cyber spies stole over $2B in Australian trade secrets and IP in FY24—according to ASIO, as reported by the Sydney Morning Herald (1 Aug 2025). Insider risk is rising too: departing staff can walk away with your designs on a USB or in a personal inbox.
Stop it at the source. Secure the file itself—not just the perimeter.

Unhackable. Secure. Always-on.
World-first, real-time protection for CAD
GuardWare PROTECT • Design keeps encryption with the file wherever it goes—cloud drives, partner inboxes, contractor laptops, even offline copies.
Persistent encryption at creation
files are protected the moment they’re saved.
Smart access controls
authorise by user, device, and policy without disrupting design workflows.
Real-time enforcement
block unauthorised opening, editing, export, and screen-scrape attempts.
Total IP control
revoke access instantly, time-limit viewing, watermark, or “remote-kill” if needed.
Result: Your CAD stays safe, your compliance posture improves, and business risk drops—no matter where the data travels.
How it fits your workflow?
Install once, centrally managed
no redesign of your stack.
Design as usual
encryption is transparent to authorized users.
Share securely
protection travels with the file to partners and contractors.
Control continuously
audit access, revoke instantly, and prove compliance.
Who benefits?
Engineering & Design Teams
keep DWG, STEP, STL, BIM, and assemblies under control.
Manufacturers & Defence Supply Chains
protect IP across multi-tier vendors.
Critical Infrastructure
safeguard schematics for energy, water, transport, ports, and more.
Frequently asked questions
01 Will this slow down my designers?
No. Encryption is in-use but transparent. Authorized users work normally.
02 Does protection remain if a file is copied or stolen?
Yes. Encryption and policy enforcement stay with the file—everywhere it goes.
03 Can I revoke access after sharing?
Instantly. You can time-limit access, watermark, geo-fence, or remotely disable a file.
04 What CAD formats are supported?
Covers common CAD formats and complex assemblies.
05 What Encryption does it use.
We use a Public/Private hybrid key model using AES256 Quantum resistant encryption and RSA 2048 both military grade encryption.



