# What does the KeenCorp software do, step by step?



##### Post Metadata
- Posted at: over 6 years ago
- Net upvotes: 1


## Comments
### Comment 1

In order to perform analysis on email or chat messages, KeenCorp&#39;s software will automatically perform the following actions:
- Detection and anonymization of the sender and receiver of the mail. Every mailbox will solely be linked to a predefined group so that an individual email message can never be traced to an individual participant;
- Detection of the email&#39;s language;
- Analysis by a NER (Named Entity Recognition): names, places and company names within the email message will be anonymized (an example of a processed message can be provided);
- Processing of the anonymized email message by KeenCorp&#39;s algorithm. The email will be processed to a numerical value that in no way can be related to the original email message.
- The exact processing of the aforementioned steps is the intellectual property of KeenCorp and consequently it is not provided to third parties.
- After the processing of email is finished, all messages will be erased from KeenCorp’s server memory: KeenCorp&#39;s server will never save any form or part of the original email message. The only data saved is a numerical value, which is further processed into a numerical index which is the only value stored into the database.

This index is linked to a predefined group and added to the group&#39;s daily average index, removing the theoretical possibility of linking any individual measurement to an individual email message or user. Requesting and visualizing the measurement data is performed by one of KeenCorp&#39;s servers. All communications are always conducted through a secure and encrypted connection. For encryption KeenCorp uses the AES256 encryption (256 bits) standard. AES256 is the “Advanced Encryption Standard” which is used, for instance, by government and security agencies in the United States to encrypt “Top Secret”-level documents and communications. KeenCorp servers only accept data from IP-addresses which are specified during the set-up process in collaboration with the client. When encrypted data is received by KeenCorp&#39;s servers, incoming data is decrypted using accompanying credentials. Based on these credentials sender identity can be verified.

##### Comment Metadata
- Posted at: over 6 years ago
- Author title: I provide certainty that risks pay off in a hospitable world




## Related Product
[KeenCorp](https://www.g2.com/products/keencorp/reviews)

## Related Category
[Text Analysis](https://www.g2.com/categories/text-analysis)

## Related discussions
- [How well does Trello scale into a larger team?](https://www.g2.com/discussions/1-how-well-does-trello-scale-into-a-larger-team)
  - Posted at: almost 13 years ago
  - Comments: 6
- [Can we please add a new section](https://www.g2.com/discussions/2-can-we-please-add-a-new-section)
  - Posted at: almost 13 years ago
  - Comments: 0
- [Quantifiable benefits from implementing your CRM](https://www.g2.com/discussions/quantifiable-benefits-from-implementing-your-crm)
  - Posted at: almost 13 years ago
  - Comments: 4


